Sciweavers

16404 search results - page 3234 / 3281
» A set coverage problem
Sort
View
122
Voted
ASE
2005
137views more  ASE 2005»
15 years 13 days ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
118
Voted
TCS
2008
15 years 13 days ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
TCS
2008
15 years 13 days ago
Kernel methods for learning languages
This paper studies a novel paradigm for learning formal languages from positive and negative examples which consists of mapping strings to an appropriate highdimensional feature s...
Leonid Kontorovich, Corinna Cortes, Mehryar Mohri
133
Voted
IPM
2007
139views more  IPM 2007»
15 years 13 days ago
"What is a good digital library?" - A quality model for digital libraries
In this article, we elaborate on the meaning of quality in digital libraries (DLs) by proposing a model that is deeply grounded in a formal framework for digital libraries: 5S (St...
Marcos André Gonçalves, Bárba...
114
Voted
IR
2007
15 years 13 days ago
Searching strategies for the Bulgarian language
This paper reports on the underlying IR problems encountered when indexing and searching with the Bulgarian language. For this language we propose a general light stemmer and demon...
Jacques Savoy
« Prev « First page 3234 / 3281 Last » Next »