Sciweavers

733 search results - page 121 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
CAV
2005
Springer
173views Hardware» more  CAV 2005»
15 years 5 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
14 years 12 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava
SEMWEB
2007
Springer
15 years 5 months ago
Hybrid Alignment Strategy for Anatomical Ontologies: Results of the 2007 Ontology Alignment Contest
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is a need for...
Songmao Zhang, Olivier Bodenreider
86
Voted
COORDINATION
2009
Springer
16 years 9 days ago
Mobility Models and Behavioural Equivalence for Wireless Networks
In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for...
Jens Chr. Godskesen, Sebastian Nanz
POPL
2008
ACM
16 years 2 days ago
Proving non-termination
The search for proof and the search for counterexamples (bugs) are complementary activities that need to be pursued concurrently in order to maximize the practical success rate of...
Ashutosh Gupta, Thomas A. Henzinger, Rupak Majumda...