Sciweavers

1078 search results - page 118 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Word Topical Mixture Models for Extractive Spoken Document Summarization
This paper considers extractive summarization of Chinese spoken documents. In contrast to conventional approaches, we attempt to deal with the extractive summarization problem und...
Berlin Chen, Yi-Ting Chen
TACAS
2007
Springer
105views Algorithms» more  TACAS 2007»
15 years 10 months ago
Hoare Logic for Realistically Modelled Machine Code
This paper presents a mechanised Hoare-style programming logic framework for assembly level programs. The framework has been designed to fit on top of operational semantics of rea...
Magnus O. Myreen, Michael J. C. Gordon
TACAS
2005
Springer
155views Algorithms» more  TACAS 2005»
15 years 10 months ago
Context-Bounded Model Checking of Concurrent Software
The interaction among concurrently executing threads of a program results in insidious programming errors that are difficult to reproduce and fix. Unfortunately, the problem of ve...
Shaz Qadeer, Jakob Rehof
JSA
2002
130views more  JSA 2002»
15 years 4 months ago
Reconfigurable models of finite state machines and their implementation in FPGAs
This paper examines some models of FSMs that can be implemented in dynamically and statically reconfigurable FPGAs. They enable circuits for the FSMs to be constructed in such a wa...
Valery Sklyarov
JDCTA
2010
143views more  JDCTA 2010»
14 years 11 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali