Sciweavers

3820 search results - page 292 / 764
» Bounded Model Debugging
Sort
View
TSP
2008
76views more  TSP 2008»
15 years 3 months ago
On the Impact of Node Failures and Unreliable Communications in Dense Sensor Networks
We consider the problem of decentralized detection in failure-prone tree networks with bounded height. Specifically, we study and contrast the impact on the detection performance o...
Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win
111
Voted
CORR
2000
Springer
115views Education» more  CORR 2000»
15 years 3 months ago
Exploiting Diversity in Natural Language Processing: Combining Parsers
Three state-of-the-art statistical parsers are combined to produce more accurate parses, as well as new bounds on achievable Treebank parsing accuracy. Two general approaches are ...
John C. Henderson, Eric Brill
144
Voted
RITA
2000
109views more  RITA 2000»
15 years 3 months ago
A logic-based approach for real-time object-oriented software development
This paper discusses how RETOOL, an action logic featuring an operator that expresses necessary conditions, postconditions and time bounds of actions, can be combined with MTL, a ...
Fernando Náufel do Amaral, Edward Hermann H...
ORL
2007
96views more  ORL 2007»
15 years 3 months ago
A note on scenario reduction for two-stage stochastic programs
We extend earlier work on scenario reduction by relying directly on Fortet–Mourier metrics instead of using upper bounds given in terms of mass transportation problems. The impo...
Holger Heitsch, Werner Römisch
CCS
2010
ACM
15 years 1 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...