Sciweavers

1813 search results - page 47 / 363
» Instance Pruning Techniques
Sort
View
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 8 months ago
Cross-Composition: A New Technique for Kernelization Lower Bounds
We introduce a new technique for proving kernelization lower bounds, called cross-composition. A classical problem L cross-composes into a parameterized problem Q if an instance o...
Hans L. Bodlaender, Bart M. P. Jansen, Stefan Krat...
CSFW
1998
IEEE
15 years 4 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
COLING
2008
15 years 1 months ago
Investigating Statistical Techniques for Sentence-Level Event Classification
The ability to correctly classify sentences that describe events is an important task for many natural language applications such as Question Answering (QA) and Summarisation. In ...
Martina Naughton, Nicola Stokes, Joe Carthy
DAC
2000
ACM
16 years 24 days ago
Forensic engineering techniques for VLSI CAD tools
The proliferation of the Internet has a ected the business model of almost all semiconductor and VLSI CAD companies that rely on intellectual property (IP) as their main source of...
Darko Kirovski, David T. Liu, Jennifer L. Wong, Mi...
DSOM
2007
Springer
15 years 6 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...