Sciweavers

11436 search results - page 2081 / 2288
» Modeling Real Reasoning
Sort
View
146
Voted
FMICS
2006
Springer
15 years 7 months ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
137
Voted
ASIACRYPT
2003
Springer
15 years 7 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
ICSE
2000
IEEE-ACM
15 years 7 months ago
Software metrics: roadmap
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Norman E. Fenton, Martin Neil
167
Voted
ASIAMS
2008
IEEE
15 years 5 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
134
Voted
SODA
2007
ACM
127views Algorithms» more  SODA 2007»
15 years 5 months ago
Line-of-sight networks
Random geometric graphs have been one of the fundamental models for reasoning about wireless networks: one places n points at random in a region of the plane (typically a square o...
Alan M. Frieze, Jon M. Kleinberg, R. Ravi, Warren ...
« Prev « First page 2081 / 2288 Last » Next »