Sciweavers
Register
Login
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Request Feature
Report Bug
Terms of Use
Privacy Policy
Cookies
Contact
Share
➚
18
search results - page 1 / 4
»
forte 2009
Sort
relevance
views
votes
recent
update
View
thumb
title
2
click to vote
FORTE
2009
96
views
Formal Methods
»
more
FORTE 2009
»
A Type Graph Model for Java Programs
12 years 7 months ago
Download
eprints.eemcs.utwente.nl
Arend Rensink, Eduardo Zambon
claim paper
Read More »
2
click to vote
FORTE
2009
135
views
Formal Methods
»
more
FORTE 2009
»
Dynamic Symbolic Execution of Distributed Concurrent Objects
12 years 7 months ago
Download
www.iist.unu.edu
Andreas Griesmayer, Bernhard K. Aichernig, Einar B...
claim paper
Read More »
4
click to vote
CCIA
2009
Springer
121
views
Artificial Intelligence
»
more
CCIA 2009
»
A New Lexical Chain Algorithm Used for Automatic Summarization
12 years 10 months ago
Download
nlp.lsi.upc.edu
Edgar González, María Fuentes Fort
claim paper
Read More »
2
click to vote
ICC
2009
IEEE
91
views
Communications
»
more
ICC 2009
»
Distributed Delay Estimation and Call Admission Control in IEEE 802.11 Wireless LANs
12 years 7 months ago
Download
ants.iis.sinica.edu.tw
Kenta Yasukawa, Andrea G. Forte, Henning Schulzrin...
claim paper
Read More »
4
click to vote
FORTE
2009
146
views
Formal Methods
»
more
FORTE 2009
»
Epistemic Logic for the Applied Pi Calculus
12 years 7 months ago
Download
www.cs.uiuc.edu
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
claim paper
Read More »
« Prev
« First
page 1 / 4
Last »
Next »