Sciweavers

618 search results - page 91 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
AAAI
1990
15 years 4 months ago
Finding the Average Rates of Change in Repetitive Behavior
The repetitive behavior of a device or system can be described in two ways: a detailed description of one iteration of the behavior, or a summary description of the behavior over ...
Alexander S. Yeh
FOSSACS
2005
Springer
15 years 8 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CISSE
2008
Springer
15 years 5 months ago
IraqComm and FlexTrans: A Speech Translation System and Flexible Framework
SRI International's IraqComm system performs bidirectional speech-to-speech machine translation between English and Iraqi Arabic in the domains of force protection, municipal ...
Michael W. Frandsen, Susanne Riehemann, Kristin Pr...
129
Voted
AMAST
2004
Springer
15 years 8 months ago
A Generic Software Safety Document Generator
Abstract. Formal certification is based on the idea that a mathematical proof of some property of a piece of software can be regarded as a certificate of correctness which, in pr...
Ewen Denney, Ram Prasad Venkatesan
AMAST
2008
Springer
15 years 5 months ago
Towards an Efficient Implementation of Tree Automata Completion
Term Rewriting Systems (TRSs) are now commonly used as a modeling language for applications. In those rewriting based models, reachability analysis, i.e. proving or disproving that...
Emilie Balland, Yohan Boichut, Thomas Genet, Pierr...