Sciweavers

5344 search results - page 157 / 1069
» Privacy-Preserving Set Operations
Sort
View
205
Voted
ICDE
2008
IEEE
191views Database» more  ICDE 2008»
16 years 4 months ago
An Algebraic Approach to Rule-Based Information Extraction
Traditional approaches to rule-based information extraction (IE) have primarily been based on regular expression grammars. However, these grammar-based systems have difficulty scal...
Frederick Reiss, Sriram Raghavan, Rajasekar Krishn...
111
Voted
CSL
2009
Springer
15 years 10 months ago
Craig Interpolation for Linear Temporal Languages
We study Craig interpolation for fragments and extensions of propositional linear temporal logic (PLTL). We consider various fragments of PLTL obtained by restricting the set of te...
Amélie Gheerbrant, Balder ten Cate
117
Voted
SLE
2009
Springer
15 years 9 months ago
Composing Feature Models
Feature modeling is a widely used technique in Software Product Line development. Feature models allow stakeholders to describe domain concepts in terms of commonalities and diffe...
Mathieu Acher, Philippe Collet, Philippe Lahire, R...
INFOCOM
2007
IEEE
15 years 9 months ago
A Framework for Tiered Service in MPLS Networks
— Many network operators offer some type of tiered service, in which users may select only from a small set of service levels (tiers). Such a service has the potential to simplif...
George N. Rouskas, Nikhil Baradwaj
DATE
2010
IEEE
204views Hardware» more  DATE 2010»
15 years 8 months ago
Assertion-based verification of RTOS properties
— Today, mobile and embedded real time systems have to cope with the migration and allocation of multiple software tasks running on top of a real time operating system (RTOS) res...
Marcio F. S. Oliveira, Henning Zabel, Wolfgang M&u...