Sciweavers

4340 search results - page 226 / 868
» Formal Methods and Cryptography
Sort
View
153
Voted
FIW
2009
120views Communications» more  FIW 2009»
15 years 2 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
SPLST
2003
15 years 6 months ago
On Typechecking B
Abstract. The typechecking system of the formal method B is discussed. An inconsistency in the public definition of the B method, attributable to a flaw in the typechecking syste...
Antti-Juhani Kaijanaho
129
Voted
ICFCA
2009
Springer
15 years 11 months ago
Revisiting the Potentialities of a Mechanical Thesaurus
This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto moder...
Uta Priss, L. John Old
CICLING
2007
Springer
15 years 11 months ago
Learning for Semantic Parsing
Semantic parsing is the task of mapping a natural language sentence into a complete, formal meaning representation. Over the past decade, we have developed a number of machine lear...
Raymond J. Mooney
144
Voted
TYPES
2007
Springer
15 years 11 months ago
Attributive Types for Proof Erasure
Abstract. Proof erasure plays an essential role in the paradigm of programming with theorem proving. In this paper, we introduce a form of attributive types that carry an attribute...
Hongwei Xi