Sciweavers

1205 search results - page 167 / 241
» Program Extraction from Large Proof Developments
Sort
View
CSFW
2009
IEEE
15 years 9 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
257
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 5 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
INFSOF
2010
173views more  INFSOF 2010»
15 years 2 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
KDD
2000
ACM
133views Data Mining» more  KDD 2000»
15 years 8 months ago
Data selection for support vector machine classifiers
The problem of extracting a minimal number of data points from a large dataset, in order to generate a support vector machine (SVM) classifier, is formulated as a concave minimiza...
Glenn Fung, Olvi L. Mangasarian
AAAI
2000
15 years 6 months ago
PROMPT: Algorithm and Tool for Automated Ontology Merging and Alignment
Researchers in the ontology-design field have developed the content for ontologies in many domain areas. Recently, ontologies have become increasingly common on the WorldWide Web ...
Natalya Fridman Noy, Mark A. Musen