Sciweavers

378 search results - page 75 / 76
» Traceability-Driven Model Refinement for Test Case Generatio...
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 5 months ago
Active Learning for Hidden Attributes in Networks
In many networks, vertices have hidden attributes that are correlated with the network's topology. For instance, in social networks, people are more likely to be friends if t...
Xiaoran Yan, Yaojia Zhu, Jean-Baptiste Rouquier, C...
JAR
2000
145views more  JAR 2000»
13 years 5 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
MM
2005
ACM
172views Multimedia» more  MM 2005»
13 years 11 months ago
Learning the semantics of multimedia queries and concepts from a small number of examples
In this paper we unify two supposedly distinct tasks in multimedia retrieval. One task involves answering queries with a few examples. The other involves learning models for seman...
Apostol Natsev, Milind R. Naphade, Jelena Tesic
APN
2010
Springer
13 years 10 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg
ISSTA
2009
ACM
13 years 12 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...