Sciweavers

4340 search results - page 683 / 868
» Formal Methods and Cryptography
Sort
View
ER
2011
Springer
265views Database» more  ER 2011»
14 years 4 months ago
Modeling the Propagation of User Preferences
Abstract. User preferences are a fundamental ingredient of personalized database applications, in particular those in which the user context plays a key role. Given a set of prefer...
Paolo Ciaccia, Riccardo Torlone
JMLR
2012
13 years 7 months ago
Joint Learning of Words and Meaning Representations for Open-Text Semantic Parsing
Open-text semantic parsers are designed to interpret any statement in natural language by inferring a corresponding meaning representation (MR – a formal representation of its s...
Antoine Bordes, Xavier Glorot, Jason Weston, Yoshu...
DAC
2012
ACM
13 years 7 months ago
Improving gate-level simulation accuracy when unknowns exist
Unknown values (Xs) may exist in a design due to uninitialized registers or blocks that are powered down. Due to X-pessimism in gate-level logic simulation, such Xs cannot be hand...
Kai-Hui Chang, Chris Browy
SIGSOFT
2007
ACM
16 years 5 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
POPL
2009
ACM
16 years 5 months ago
A calculus of atomic actions
We present a proof calculus and method for the static verification of assertions and procedure specifications in shared-memory concurrent programs. The key idea in our approach is...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran