Sciweavers

1486 search results - page 102 / 298
» Firewall Rules Analysis
Sort
View
DGO
2006
116views Education» more  DGO 2006»
15 years 5 months ago
Multidimensional text analysis for eRulemaking
To support rule-writers, we are developing techniques to automatically analyze large number of public comments on proposed regulations. A document is analyzed in various ways incl...
Namhee Kwon, Stuart W. Shulman, Eduard H. Hovy
121
Voted
ANLP
2000
96views more  ANLP 2000»
15 years 5 months ago
Efficient parsing strategies for syntactic analysis of closed captions
We present an efficientmulti-levelchart parser that was designed forsyntacticanalysisofclosedcaptions (subtitles) in a real-time Machine Translation (MT) system. In order to achie...
Krzysztof Czuba
DAGSTUHL
1996
15 years 5 months ago
An Automatic Interprocedural Analysis for the Understanding of Scientific Application Programs
This paper reports on an approachfor improvingthe understandingof old programs which have become very complex due to numerous extensions. We have adapted partial evaluation techni...
Sandrine Blazy, Philippe Facon
PSTV
1992
113views Hardware» more  PSTV 1992»
15 years 5 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
115
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 4 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...