Sciweavers

ACSC
2001
IEEE
13 years 11 months ago
TRAM: A Tool for Requirements and Architecture Management
Management of system requirements and system architectures is part of any software engineering project. But it is usually very tedious and error prone. In particular, managing the...
Jun Han
ACSC
2001
IEEE
13 years 11 months ago
Efficiency of Data Structures for Detecting Overlaps in Digital Documents
This paper analyses the efficiency of different data structures for detecting overlap in digital documents. Most existing approaches use some hash function to reduce the space req...
Krisztián Monostori, Arkady B. Zaslavsky, H...
FOCS
2006
IEEE
13 years 11 months ago
Witnesses for non-satisfiability of dense random 3CNF formulas
We consider random 3CNF formulas with n variables and m clauses. It is well known that when m > cn (for a sufficiently large constant c), most formulas are not satisfiable. How...
Uriel Feige, Jeong Han Kim, Eran Ofek
ERSHOV
2006
Springer
13 years 11 months ago
Formal Methods in Industrial Software Standards Enforcement
The article presents an approach to development of software standards usage infrastructure. The approach is based on formalization of standards and automated conformance test deriv...
Alexey Grinevich, Alexey V. Khoroshilov, Victor V....
ERSHOV
2006
Springer
13 years 11 months ago
Linear Complementarity and P-Matrices for Stochastic Games
Abstract. We define the first nontrivial polynomially recognizable subclass of P-matrix Generalized Linear Complementarity Problems (GLCPs) with a subexponential pivot rule. No suc...
Ola Svensson, Sergei G. Vorobyov
ERSHOV
2006
Springer
13 years 11 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer
ERSHOV
2006
Springer
13 years 11 months ago
An ASM Semantics of Token Flow in UML 2 Activity Diagrams
Abstract. The token flow semantics of UML 2 activity diagrams is formally defined using Abstract State Machines. Interruptible activity regions and multiplicity bounds for pins are...
Stefan Sarstedt, Walter Guttmann
ERSHOV
2006
Springer
13 years 11 months ago
Visual Rules Modeling
Sergey Lukichev, Gerd Wagner
ERSHOV
2006
Springer
13 years 11 months ago
On the Importance of Parameter Tuning in Text Categorization
Abstract. Text Categorization algorithms have a large number of parameters that determine their behaviour, whose effect is not easily predicted objectively or intuitively and may v...
Cornelis H. A. Koster, Jean Beney
ERSHOV
2006
Springer
13 years 11 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska