Sciweavers

4340 search results - page 208 / 868
» Formal Methods and Cryptography
Sort
View
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
15 years 2 months ago
Specification and Verification of Model Transformations Using UML-RSDS
In this paper we describe techniques for the specification and verification of model transformations using a combination of UML and formal methods. The use of UML 2 notations to s...
Kevin Lano, Shekoufeh Kolahdouz Rahimi
AIPS
1998
15 years 6 months ago
How to Solve It Automatically: Selection Among Problem Solving Methods
The choice of an appropriate problem-solving method, from available methods, is a crucial skill for experts in many areas. We describe a technique for the automatic selection amon...
Eugene Fink
PRL
2006
106views more  PRL 2006»
15 years 4 months ago
Invariances in kernel methods: From samples to objects
This paper presents a general method for incorporating prior knowledge into kernel methods such as Support Vector Machines. It applies when the prior knowledge can be formalized b...
Alexei Pozdnoukhov, Samy Bengio
SEFM
2005
IEEE
15 years 10 months ago
Experimental Evaluation of FSM-Based Testing Methods
The development of test cases is an important issue for testing software, communication protocols and other reactive systems. A number of methods are known for the development of ...
Rita Dorofeeva, Nina Yevtushenko, Khaled El-Fakih,...
EUPROJECTS
2005
Springer
15 years 10 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann