• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 354
Next 10 →

Proof-Carrying Code

by George C. Necula , 1997
"... This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety proo ..."
Abstract - Cited by 1240 (27 self) - Add to MetaCart
proof that attests to the code's adherence to a previously defined safety policy. The host can then easily and quickly validate the proof without using cryptography and without consulting any external agents. In order to gain preliminary experience with PCC, we have performed several case studies

Cognitive apprenticeship: making thinking visible

by Allan Collins, John Seely Brown, Ann Holum - American Educator , 1991
"... IN ANCIENT times, teaching and learning were accomplished through apprenticeship: We taught our children how to speak, grow crops, craft cabinets, or tailor clothes by showing them how and by helping them do it. Apprenticeship was the vehicle for transmitting the knowledge required for expert practi ..."
Abstract - Cited by 209 (0 self) - Add to MetaCart
practice in fields from painting and sculpting to medicine and law. It was the natural way to learn. In modern times, apprenticeship has largely been replaced by formal schooling, except in children's learning of language, in some aspects of graduate education, and in on-the-job training. We propose

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
you quite quickly what to choose. However, you cannot use the same simple emotional judgment when you are in the shoes of an economist trying to optimize the access to the locks on the Mississippi River. The task is to find a pricing structure that assures the most efficient and uninterrupted use

Testing Formal Semantics with QuickCheck

by Andrew Butterfield, Brian J. Corcoran
"... Abstract. We describe the use of the Haskell testing package QuickCheck to aid in the debugging of the operational and denotational semantics of a hardware compilation language called Handel-C. 1 ..."
Abstract - Add to MetaCart
Abstract. We describe the use of the Haskell testing package QuickCheck to aid in the debugging of the operational and denotational semantics of a hardware compilation language called Handel-C. 1

Mining the Web for Bilingual Text

by Philip Resnik - In Proceedings of the 37th Annual Meeting of the Association for Computational Linguistics , 1999
"... STRAND (Resnik, 1998) is a language-independent system for automatic discovery of text in parallel translation on the World Wide Web. This paper extends the preliminary STRAND results by adding automatic language identification, scaling up by orders of magnitude, and formally evaluating performance. ..."
Abstract - Cited by 135 (7 self) - Add to MetaCart
STRAND (Resnik, 1998) is a language-independent system for automatic discovery of text in parallel translation on the World Wide Web. This paper extends the preliminary STRAND results by adding automatic language identification, scaling up by orders of magnitude, and formally evaluating performance

How long does it take English learners to attain proficiency? Retrieved

by Kenji Hakuta , Yuko Goto Butler , Daria Witt - The acquisition of the IP system in child L2 English. Studies in Second Language Acquisition, , 2000
"... Abstract One of the most commonly asked questions about the education of language minority students is how long they need special services, such as English-as-a-Second-Language (ESL) and bilingual education. Under the U. S. Supreme Court's interpretation of the Civil Rights Act in Lau v. Nicho ..."
Abstract - Cited by 131 (0 self) - Add to MetaCart
Abstract One of the most commonly asked questions about the education of language minority students is how long they need special services, such as English-as-a-Second-Language (ESL) and bilingual education. Under the U. S. Supreme Court's interpretation of the Civil Rights Act in Lau v

How to Jump Over The Fence

by Quick Brown Fox
"... The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. ..."
Abstract - Add to MetaCart
The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence. The quick brown fox jumped over the fence

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask

by Edward J. Schwartz, Thanassis Avgerinos, David Brumley - In Proceedings of the IEEE Symposium on Security and Privacy , 2010
"... Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability discove ..."
Abstract - Cited by 106 (5 self) - Add to MetaCart
Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability

A Quick Overview of Larch/C++

by Yoonsik Cheon, Gary T. Leavens - JOURNAL OF OBJECT-ORIENTED PROGRAMMING , 1994
"... This paper gives a quick overview of Larch/C++, an interface specification language for C++. Through examples, we explain declarations, function specifications, class specifications, and template specifications. An extended example is given in the last section. The reader is assumed to have some fam ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
This paper gives a quick overview of Larch/C++, an interface specification language for C++. Through examples, we explain declarations, function specifications, class specifications, and template specifications. An extended example is given in the last section. The reader is assumed to have some

A Quick Tutorial on JET

by Yoonsik Cheon, Yoonsik Cheon, Yoonsik Cheon , 2007
"... JET is an automated unit testing tool for Java classes an-notated with JML specifications; JML is a formal interface specification language for Java to document the behavior of Java classes and interfaces. JET tests each method of the class under test separately. For each method, it generates a coll ..."
Abstract - Add to MetaCart
JET is an automated unit testing tool for Java classes an-notated with JML specifications; JML is a formal interface specification language for Java to document the behavior of Java classes and interfaces. JET tests each method of the class under test separately. For each method, it generates a
Next 10 →
Results 1 - 10 of 354
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University