Sciweavers

11717 search results - page 51 / 2344
» Where are you From
Sort
View
CAV
1998
Springer
103views Hardware» more  CAV 1998»
14 years 2 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
ASPLOS
2008
ACM
13 years 12 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
APWEB
2010
Springer
13 years 9 months ago
Suggesting Topic-Based Query Terms as You Type
— Query term suggestion that interactively expands the queries is an indispensable technique to help users formulate high-quality queries and has attracted much attention in the ...
Ju Fan, Hao Wu, Guoliang Li, Lizhu Zhou
JAIR
2010
94views more  JAIR 2010»
13 years 8 months ago
Which Clustering Do You Want? Inducing Your Ideal Clustering with Minimal Feedback
While traditional research on text clustering has largely focused on grouping documents by topic, it is conceivable that a user may want to cluster documents along other dimension...
Sajib Dasgupta, Vincent Ng
MATES
2010
Springer
13 years 8 months ago
Do You Get It? User-Evaluated Explainable BDI Agents
Abstract. In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scena...
Joost Broekens, Maaike Harbers, Koen V. Hindriks, ...