Sciweavers

27 search results - page 5 / 6
» Towards Automation of Testing High-Level Security Properties
Sort
View
DATE
2006
IEEE
96views Hardware» more  DATE 2006»
13 years 11 months ago
On the relation between simulation-based and SAT-based diagnosis
The problem of diagnosis – or locating the source of an error or fault – occurs in several areas of Computer Aided Design, such as dynamic verification, property checking, eq...
Görschwin Fey, Sean Safarpour, Andreas G. Ven...
CSL
2007
Springer
13 years 5 months ago
Speaker-adaptive learning of resonance targets in a hidden trajectory model of speech coarticulation
A novel speaker-adaptive learning algorithm is developed and evaluated for a hidden trajectory model of speech coarticulation and reduction. Central to this model is the process o...
Dong Yu, Li Deng, Alex Acero
BPSC
2009
190views Business» more  BPSC 2009»
13 years 6 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
LREC
2010
200views Education» more  LREC 2010»
13 years 6 months ago
The Leeds Arabic Discourse Treebank: Annotating Discourse Connectives for Arabic
We present the first effort towards producing an Arabic Discourse Treebank, a news corpus where all discourse connectives are identified and annotated with the discourse relations...
Amal Al-Saif, Katja Markert
JAR
2000
145views more  JAR 2000»
13 years 5 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro