Sciweavers

2608 search results - page 437 / 522
» Subjects, Models, Languages, Transformations
Sort
View
LICS
2006
IEEE
15 years 6 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
MSWIM
2006
ACM
15 years 5 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
JAIR
2007
132views more  JAIR 2007»
14 years 11 months ago
Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text
It is well known that utterances convey a great deal of information about the speaker in addition to their semantic content. One such type of information consists of cues to the s...
François Mairesse, Marilyn A. Walker, Matth...
TOMACS
1998
140views more  TOMACS 1998»
14 years 11 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
PLDI
2010
ACM
15 years 5 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...