Sciweavers

1634 search results - page 224 / 327
» Reasoning about Knowledge Using Rough Sets
Sort
View
119
Voted
SIGUCCS
2000
ACM
15 years 4 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
15 years 2 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
81
Voted
SOSP
2001
ACM
15 years 9 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
FAC
2010
121views more  FAC 2010»
14 years 10 months ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
124
Voted
ACL
2003
15 years 2 months ago
Recognizing Expressions of Commonsense Psychology in English Text
Many applications of natural language processing technologies involve analyzing texts that concern the psychological states and processes of people, including their beliefs, goals...
Andrew Gordon, Abe Kazemzadeh, Anish Nair, Milena ...