Sciweavers

126 search results - page 14 / 26
» Hierarchical Set Decision Diagrams and Regular Models
Sort
View
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
15 years 4 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
ICSE
2008
IEEE-ACM
16 years 1 months ago
Using JULE to generate a compliance test suite for the UML standard
The Java-UML Lightweight Enumerator (JULE) tool implements a vitally important aspect of the framework for software tool certification - test suite generation. The framework uses ...
Panuchart Bunyakiati, Anthony Finkelstein, James S...
CSL
2010
Springer
15 years 14 days ago
Evaluation of a hierarchical reinforcement learning spoken dialogue system
We describe an evaluation of spoken dialogue strategies designed using hierarchical reinforcement learning agents. The dialogue strategies were learnt in a simulated environment a...
Heriberto Cuayáhuitl, Steve Renals, Oliver ...
CHARME
2001
Springer
107views Hardware» more  CHARME 2001»
15 years 4 months ago
Using Combinatorial Optimization Methods for Quantification Scheduling
Model checking is the process of verifying whether a model of a concurrent system satisfies a specified temporal property. Symbolic algorithms based on Binary Decision Diagrams (BD...
Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, Jame...
103
Voted
DSN
2008
IEEE
15 years 2 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu