Sciweavers

726 search results - page 136 / 146
» Reasoning about Feature Models in Higher-Order Logic
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
CSL
2010
Springer
14 years 10 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
IFIP
2004
Springer
15 years 3 months ago
Isolated Word Recognition for English Language Using LPC, VQ and HMM
: Speech recognition is always looked upon as a fascinating field in human computer interaction. It is one of the fundamental steps towards understanding human cognition and their ...
Mayukh Bhaowal, Kunal Chawla
109
Voted
OOPSLA
2007
Springer
15 years 3 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
ENTCS
2006
1305views more  ENTCS 2006»
14 years 9 months ago
Communication Attitudes: A Formal Approach to Ostensible Intentions, and Individual and Group Opinions
Conventional approaches to the modeling of autonomous agents and agent communication rely heavily on the ascription of mental properties like beliefs and intentions to the individ...
Matthias Nickles, Felix A. Fischer, Gerhard Wei&sz...