Sciweavers

174 search results - page 8 / 35
» Improving Design Patterns Finder Precision Using a Model Che...
Sort
View
DAC
2006
ACM
15 years 11 months ago
Automatic invariant strengthening to prove properties in bounded model checking
In this paper, we present a method that helps improve the performance of Bounded Model Checking by automatically strengthening invariants so that the termination proof may be obta...
Mohammad Awedh, Fabio Somenzi
CICLING
2010
Springer
14 years 5 months ago
A Chunk-Driven Bootstrapping Approach to Extracting Translation Patterns
Abstract. We present a linguistically-motivated sub-sentential alignment system that extends the intersected IBM Model 4 word alignments. The alignment system is chunk-driven and r...
Lieve Macken, Walter Daelemans
NLUCS
2004
14 years 12 months ago
Cognitive Dialogue Management
Abstract. Cognitive Dialogue Management is a novel approach to Dialogue Management which proposes a novel architecture for building up advanced interactive interfaces in natural la...
Vincenzo Pallotta
SIGSOFT
2007
ACM
15 years 11 months ago
Beyond refactoring: a framework for modular maintenance of crosscutting design idioms
Despite the automated refactoring support provided by today's IDEs many program transformations that are easy to conceptualize-such as improving the implementation of a desig...
Macneil Shonle, William G. Griswold, Sorin Lerner
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 10 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...