Sciweavers

57 search results - page 4 / 12
» Where Do Bugs Come from
Sort
View
KBS
1998
122views more  KBS 1998»
13 years 7 months ago
Concept formation in design
: This paper presents a computationally tractable view on where simple design concepts come from by proposing a paradigm for the formation of design concepts based on the emergence...
John S. Gero
EMNLP
2010
13 years 5 months ago
Learning First-Order Horn Clauses from Web Text
Even the entire Web corpus does not explicitly answer all questions, yet inference can uncover many implicit answers. But where do inference rules come from? This paper investigat...
Stefan Schoenmackers, Jesse Davis, Oren Etzioni, D...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
IMC
2007
ACM
13 years 9 months ago
Understanding wifi-based connectivity from moving vehicles
– Using measurements from VanLAN, a modest-size testbed that we have deployed, we analyze the fundamental characteristics of WiFi-based connectivity between basestations and vehi...
Ratul Mahajan, John Zahorjan, Brian Zill
DATE
2008
IEEE
113views Hardware» more  DATE 2008»
14 years 2 months ago
Random Stimulus Generation using Entropy and XOR Constraints
Despite the growing research effort in formal verification, constraint-based random simulation remains an integral part of design validation, especially for large design componen...
Stephen Plaza, Igor L. Markov, Valeria Bertacco