Sciweavers

278 search results - page 54 / 56
» A Framework for Counterexample Generation and Exploration
Sort
View
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
14 years 2 months ago
Hardware synthesis from guarded atomic actions with performance specifications
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Daniel L. Rosenband
PLDI
2009
ACM
14 years 26 days ago
Snugglebug: a powerful approach to weakest preconditions
Symbolic analysis shows promise as a foundation for bug-finding, specification inference, verification, and test generation. This paper addresses demand-driven symbolic analysi...
Satish Chandra, Stephen J. Fink, Manu Sridharan
SIGIR
2005
ACM
13 years 11 months ago
A probabilistic model for retrospective news event detection
Retrospective news event detection (RED) is defined as the discovery of previously unidentified events in historical news corpus. Although both the contents and time information...
Zhiwei Li, Bin Wang, Mingjing Li, Wei-Ying Ma
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
13 years 11 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
SEMWEB
2009
Springer
13 years 10 months ago
Enrichment and Ranking of the YouTube Tag Space and Integration with the Linked Data Cloud
The increase of personal digital cameras with video functionality and video-enabled camera phones has increased the amount of user-generated videos on the Web. People are spending ...
Smitashree Choudhury, John G. Breslin, Alexandre P...