Sciweavers

8627 search results - page 1696 / 1726
» Software Engineering Using RATionale
Sort
View
CCS
2008
ACM
15 years 2 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ISMB
1994
15 years 1 months ago
GeneQuiz: A Workbench for Sequence Analysis
Wepresent the prototype of a software system, cMledGeneQuiz,for large-scale biological sequence analysis. The system was designed to meet the needs that arise in computational seq...
Michael Scharf, Reinhard Schneider, Georg Casari, ...
119
Voted
ACL
1992
15 years 1 months ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
CLEF
2009
Springer
15 years 1 months ago
UNIBA-SENSE @ CLEF 2009: Robust WSD Task
This paper presents the participation of the semantic N-levels search engine SENSE at the CLEF 2009 Ad Hoc Robust-WSD Task. During the participation at the same task of CLEF 2008,...
Pierpaolo Basile, Annalina Caputo, Giovanni Semera...
SOFTVIS
2010
ACM
15 years 22 days ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
« Prev « First page 1696 / 1726 Last » Next »