Sciweavers

2872 search results - page 228 / 575
» On (Omega-)Regular Model Checking
Sort
View
JSAC
2011
108views more  JSAC 2011»
14 years 11 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
ASIACRYPT
2003
Springer
15 years 9 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 11 months ago
Extracting Features from Ratings: The Role of Factor Models
Abstract. Performing effective preference-based data retrieval requires detailed and preferentially meaningful structurized information about the current user as well as the items ...
Joachim Selke, Wolf-Tilo Balke
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
15 years 10 months ago
Improved Visibility in One-to-Many Trace Concretization
We present an improved algorithm for concretization of abstract eres in abstraction refinement-based invariant checking. The algorithm maps each transition of the abstract error ...
Kuntal Nanshi, Fabio Somenzi
QSIC
2005
IEEE
15 years 9 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg