Sciweavers

1033 search results - page 56 / 207
» Properties of Exercise Strategies
Sort
View
IJFCS
2008
81views more  IJFCS 2008»
14 years 10 months ago
Reachability Analysis in Verification via Supercompilation
Abstract. We present an approach to verification of parameterized systems, which is based on program transformation technique known as supercompilation. In this approach the statem...
Alexei Lisitsa, Andrei P. Nemytykh
ACE
2004
182views Education» more  ACE 2004»
14 years 11 months ago
Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload
A key problem in facilitating a successful online course is the highly time -consuming nature of the administrative and pedagogical tasks involved. It is also difficult to achieve...
Stuart Young, Mae McSporran
SIGMOD
2008
ACM
122views Database» more  SIGMOD 2008»
15 years 10 months ago
Building query optimizers for information extraction: the SQoUT project
Text documents often embed data that is structured in nature. This structured data is increasingly exposed using information extraction systems, which generate structured relation...
Alpa Jain, Panagiotis G. Ipeirotis, Luis Gravano
MFCS
2009
Springer
15 years 4 months ago
Synthesis for Structure Rewriting Systems
Abstract. The description of a single state of a modelled system is often complex in practice, but few procedures for synthesis address this problem in depth. We study systems in w...
Lukasz Kaiser
ICCS
2009
Springer
15 years 4 months ago
A Second Order Adjoint Method to Targeted Observations
The role of the second order adjoint in targeting strategies is studied and analyzed. Most targeting strategies use the first order adjoint to identify regions where additional in...
Humberto C. Godinez, Dacian N. Daescu