Sciweavers

3235 search results - page 557 / 647
» Partial Redundant Modeling
Sort
View
108
Voted
ECLIPSE
2005
ACM
15 years 5 months ago
NaCIN: an Eclipse plug-in for program navigation-based concern inference
In this paper we describe NaCIN, an Eclipse plug-in that records a developer’s code navigation activity and produces sets of elements potentially implementing different concerns...
Imran Majid, Martin P. Robillard
139
Voted
CP
2008
Springer
15 years 5 months ago
CPBPV: A Constraint-Programming Framework for Bounded Program Verification
Abstract. This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification...
Hélène Collavizza, Michel Rueher, Pa...
144
Voted
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
147
Voted
CSL
2008
Springer
15 years 5 months ago
On Counting Generalized Colorings
Abstract. The notion of graph polynomials definable in Monadic Second Order Logic, MSOL, was introduced in [Mak04]. It was shown that the Tutte polynomial and its generalization, a...
Tomer Kotek, Johann A. Makowsky, Boris Zilber
107
Voted
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 5 months ago
Inter-organizational Knowledge Transfer in the Buyer-Supplier Relationship: A Buyer's Perspective
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Sung-Byung Yang, Young-Gul Kim