Sciweavers

611 search results - page 112 / 123
» Yuri, Logic, and Computer Science
Sort
View
FECS
2006
113views Education» more  FECS 2006»
14 years 11 months ago
A Lightweight Program Similarity Detection Model using XML and Levenshtein Distance
Program plagiarism is one of the most significant problems in Computer Science education. Most common plagiarism includes modifying comments, reordering statements, and changing v...
Seo-Young Noh, Sangwoo Kim, Cheonyoung Jung
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 9 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden
IJDAR
2006
103views more  IJDAR 2006»
14 years 9 months ago
Table-processing paradigms: a research survey
Tables are a ubiquitous form of communication. While everyone seems to know what a table is, a precise, analytical definition of "tabularity" remains elusive because some...
David W. Embley, Matthew Hurst, Daniel P. Lopresti...
DKE
2007
131views more  DKE 2007»
14 years 9 months ago
Reasoning and change management in modular ontologies
ct 9 The benefits of modular representations are well known from many areas of computer science. While in software engi10 neering modularization is mainly a vehicle for supporting...
Heiner Stuckenschmidt, Michel C. A. Klein
69
Voted
EJWCN
2010
122views more  EJWCN 2010»
14 years 4 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...