Sciweavers

1518 search results - page 137 / 304
» Cryptographic Test Correction
Sort
View
143
Voted
WORDS
2005
IEEE
15 years 9 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
ATAL
2005
Springer
15 years 9 months ago
Using decision-theoretic models to enhance agent system survivability
A survivable agent system depends on the incorporation of many recovery features. However, the optimal use of these features requires the ability to assess the actual state of the...
Anthony R. Cassandra, Marian H. Nodine, Shilpa Bon...
152
Voted
ECOOP
1999
Springer
15 years 8 months ago
Inlining of Virtual Methods
We discuss aspects of inlining of virtual method invocations. First, we introduce a new method test to guard inlinings of such invocations, with a di erent set of tradeo s from the...
David Detlefs, Ole Agesen
FORTE
2008
15 years 5 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
COLING
2000
15 years 5 months ago
Automatic Semantic Sequence Extraction from Unrestricted Non-Tagged Texts
Mophological processing, syntactic parsing and other useflfl tools have been proposed in the field of natural language processing(NLP). Many of those NLP tools take dictionary-bas...
Shiho Nobesawa, Hiroaki Saito, Masakazu Nakanishi