• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,113
Next 10 →

A capacity theory of comprehension: Individual differences in working memory

by Marcel Adam Just, Patricia A. Carpenter - Psychological Review , 1992
"... A theory of the way working memory capacity constrains comprehension is proposed. The theory proposes that both processing and storage are mediated by activation and that the total amount of activation available in working memory varies among individuals. Individual differences in working memory cap ..."
Abstract - Cited by 700 (21 self) - Add to MetaCart
capacity for language can account for qualitative and quantitative differences among college-age adults in several aspects of language comprehension. One aspect is syntactic modularity: The larger capacity of some individuals permits interaction among syntactic and pragmatic information, so

Process Instantiation

by G. Decker, J. Mendling - Data & Knowledge Engineering
"... Although several process modeling languages allow one to specify processes with multiple start elements, the precise semantics of such models are often unclear, both from a pragmatic and from a theoretical point of view. This paper addresses the lack of research on this problem and introduces the CA ..."
Abstract - Cited by 12 (7 self) - Add to MetaCart
Although several process modeling languages allow one to specify processes with multiple start elements, the precise semantics of such models are often unclear, both from a pragmatic and from a theoretical point of view. This paper addresses the lack of research on this problem and introduces

Instantiation Semantics for Process Models

by Gero Decker, Jan Mendling - In: Proceedings of the 6th International Conference on Business Process Management (BPM), LNCS 2008, S
"... Abstract. Although several process modeling languages allow one to specify processes with multiple start elements, the precise semantics of such models are often unclear, both from a pragmatic and from a theoretical point of view. This paper addresses the lack of research on this problem and introdu ..."
Abstract - Cited by 8 (4 self) - Add to MetaCart
Abstract. Although several process modeling languages allow one to specify processes with multiple start elements, the precise semantics of such models are often unclear, both from a pragmatic and from a theoretical point of view. This paper addresses the lack of research on this problem

Hierarchical Instantiation for Radiosity

by Cyril Soler , François Sillion - IN RENDERING TECHNIQUES ’00, B. PEROCHE AND , 2000
"... We present the concept of hierarchical instantiation for radiosity. This new method enables an efficient, yet accurate determination of the illumination in very large scenes, where similar objects are replaced by instances of the same element. Instances are equipped with suitable radiative prope ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We present the concept of hierarchical instantiation for radiosity. This new method enables an efficient, yet accurate determination of the illumination in very large scenes, where similar objects are replaced by instances of the same element. Instances are equipped with suitable radiative

INTERACTIVE SCRIPT INSTANTIATION

by Michael J. Pazzani
"... The KNOBS [ENGELMAN 801 planning system is an experimental expert system which assists a user by instantiating 8 stereotypical solution to his problem. SKU=, the natural language understanding component of KNOBS, can engage in a dialog with the user to allow him to enter components of a plan or to a ..."
Abstract - Add to MetaCart
The KNOBS [ENGELMAN 801 planning system is an experimental expert system which assists a user by instantiating 8 stereotypical solution to his problem. SKU=, the natural language understanding component of KNOBS, can engage in a dialog with the user to allow him to enter components of a plan

Complete instantiation for quantified formulas in Satisfiabiliby Modulo Theories

by Yeting Ge, Leonardo De Moura
"... Abstract. Quantifier reasoning in Satisfiability Modulo Theories (SMT) is a long-standing challenge. The practical method employed in modern SMT solvers is to instantiate quantified formulas based on heuristics, which is not refutationally complete even for pure first-order logic. We present several ..."
Abstract - Cited by 50 (2 self) - Add to MetaCart
Abstract. Quantifier reasoning in Satisfiability Modulo Theories (SMT) is a long-standing challenge. The practical method employed in modern SMT solvers is to instantiate quantified formulas based on heuristics, which is not refutationally complete even for pure first-order logic. We present

Solving SAT and SAT Modulo Theories: from an Abstract Davis-Putnam-Logemann-Loveland Procedure to DPLL(T)

by Robert Nieuwenhuis, Albert Oliveras, Cesare Tinelli - JOURNAL OF THE ACM , 2006
"... We first introduce Abstract DPLL, a rule-based formulation of the Davis-Putnam-Logemann-Loveland (DPLL) procedure for propositional satisfiability. This abstract framework allows one to cleanly express practical DPLL algorithms and to formally reason about them in a simple way. Its properties, such ..."
Abstract - Cited by 255 (29 self) - Add to MetaCart
, such as soundness, completeness or termination, immediately carry over to the modern DPLL implementations with features such as backjumping or clause learning. We then extend the framework to Satisfiability Modulo background Theories (SMT) and use it to model several variants of the so-called lazy approach for SMT

Instantiating Random Oracles via UCEs

by Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi , 2013
"... This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions; p ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions

Abstract vs Concrete Clabjects in Dual Deep Instantiation

by Bernd Neumayr, Michael Schrefl
"... Abstract. Deep Instantiation allows for a compact representation of models with multiple instantiation levels where clabjects combine object and class facets and allow to characterize the schema of model elements several instantiation levels below. Clabjects with common properties may be generalized ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Deep Instantiation allows for a compact representation of models with multiple instantiation levels where clabjects combine object and class facets and allow to characterize the schema of model elements several instantiation levels below. Clabjects with common properties may

On the instantiability of hash-andsign rsa signatures

by Yevgeniy Dodis, Iftach Haitner, Aris Tentes - In TCC , 2012
"... The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the only existing analysis of this popular signature scheme is in the random oracle model, where the resulting idealized sign ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
signature is known as the RSA Full Domain Hash signature scheme (RSA-FDH). In fact, prior work has shown several “uninstantiability ” results for various abstractions of RSA-FDH, where the RSA function was replaced by a family of trapdoor random permutations, or the hash function instantiating the random
Next 10 →
Results 1 - 10 of 1,113
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University