Sciweavers

958 search results - page 40 / 192
» Model Transformation Languages and Their Implementation by B...
Sort
View
SIGSOFT
2007
ACM
16 years 2 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ATVA
2007
Springer
226views Hardware» more  ATVA 2007»
15 years 7 months ago
Bounded Model Checking of Analog and Mixed-Signal Circuits Using an SMT Solver
This paper presents a bounded model checking algorithm for the verification of analog and mixed-signal (AMS) circuits using a satisfiability modulo theories (SMT) solver. The sys...
David Walter, Scott Little, Chris J. Myers
COLING
2010
14 years 8 months ago
Syntax-Driven Machine Translation as a Model of ESL Revision
In this work, we model the writing revision process of English as a Second Language (ESL) students with syntaxdriven machine translation methods. We compare two approaches: tree-t...
Huichao Xue, Rebecca Hwa
COLING
2010
14 years 8 months ago
Improving Name Origin Recognition with Context Features and Unlabelled Data
We demonstrate the use of context features, namely, names of places, and unlabelled data for the detection of personal name language of origin. While some early work used either r...
Vladimir Pervouchine, Min Zhang, Ming Liu, Haizhou...
MDAFA
2004
Springer
114views Hardware» more  MDAFA 2004»
15 years 6 months ago
Modeling in the Large and Modeling in the Small
Abstract. As part of the AMMA project (ATLAS Model Management Architecture), we are currently building several model management tools to support the tasks of modeling in the large ...
Jean Bézivin, Frédéric Jouaul...