Skip to main content

previous disabled Page of 261
and
Your search also matched 63,957 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Deep Learning for Journalism: The Bibliometric Analysis of Deep Learning for News Production in the Artificial Intelligence Era

Include preview-only content
  1. Chapter and Conference Paper

    Computing the Edge Expansion of a Graph Using Semidefinite Programming

    Computing the edge expansion of a graph is a famously hard combinatorial problem for which there have been many approximation studies. We present two versions of an exact algorithm using semidefinite programmi...

    Akshay Gupte, Melanie Siebenhofer, Angelika Wiegele in Combinatorial Optimization (2024)

  2. Chapter and Conference Paper

    Correction to: Anti-Money Laundering in Cryptocurrency via Multi-Relational Graph Neural Network

    Woochang Hyun, Jaehong Lee, Bongwon Suh in Advances in Knowledge Discovery and Data Mining (2023)

  3. Chapter

    Correction to: Deriving Priorities from Incomplete Fuzzy Reciprocal Preference Relations

    Yejun Xu in Deriving Priorities from Incomplete Fuzzy Reciprocal Preference Relations (2023)

  4. Chapter and Conference Paper

    CoqCryptoLine: A Verified Model Checker with Certified Results

    We present the verified model checker CoqCryptoLine for cryptographic programs with certified verification results. The CoqCryptoLine verification algorithm consists of two reductions. The algebraic reduction tra...

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  5. Chapter and Conference Paper

    Words Can Be Confusing: Stereotype Bias Removal in Text Classification at the Word Level

    Text classification is a widely used task in natural language processing. However, the presence of stereotype bias in text classification can lead to unfair and inaccurate predictions. Stereotype bias is parti...

    Shaofei Shen, Mingzhe Zhang, Weitong Chen in Advances in Knowledge Discovery and Data M… (2023)

  6. Chapter and Conference Paper

    Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction

    Recently, many studies incorporate external knowledge into character-level feature based models to improve the performance of Chinese relation extraction. However, these methods tend to ignore the internal inf...

    **g Yang, Bin Ji, Shasha Li, Jun Ma in Advances in Knowledge Discovery and Data M… (2023)

  7. Chapter and Conference Paper

    nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models

    A rigorous formalization of desired system requirements is indispensable when performing any verification task. This often limits the application of verification techniques, as writing formal specifications is...

    Matthias Cosler, Christopher Hahn, Daniel Mendoza in Computer Aided Verification (2023)

  8. Chapter and Conference Paper

    Correction to: CoqCryptoLine: A Verified Model Checker with Certified Results

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  9. Chapter and Conference Paper

    3D Environment Modeling for Falsification and Beyond with Scenic 3.0

    We present a major new version of Scenic, a probabilistic programming language for writing formal models of the environments of cyber-physical systems. Scenic has been successfully used for the design and anal...

    Eric Vin, Shun Kashiwa, Matthew Rhea, Daniel J. Fremont in Computer Aided Verification (2023)

  10. Chapter and Conference Paper

    cPNN: Continuous Progressive Neural Networks for Evolving Streaming Time Series

    Dealing with an unbounded data stream involves overcoming the assumption that data is identically distributed and independent. A data stream can, in fact, exhibit temporal dependencies (i.e., be a time series)...

    Federico Giannini, Giacomo Ziffer in Advances in Knowledge Discovery and Data M… (2023)

  11. Chapter and Conference Paper

    Automatic Program Instrumentation for Automatic Verification

    In deductive verification and software model checking, dealing with certain specification language constructs can be problematic when the back-end solver is not sufficiently powerful or lacks the required theo...

    Jesper Amilon, Zafer Esen, Dilian Gurov, Christian Lidström in Computer Aided Verification (2023)

  12. Chapter and Conference Paper

    Active Learning of Deterministic Timed Automata with Myhill-Nerode Style Characterization

    We present an algorithm to learn a deterministic timed automaton (DTA) via membership and equivalence queries. Our algorithm is an extension of the L* algorithm with a Myhill-Nerode style characterization of r...

    Masaki Waga in Computer Aided Verification (2023)

  13. Chapter and Conference Paper

    Certified Verification for Algebraic Abstraction

    We present a certified algebraic abstraction technique for verifying bit-accurate non-linear integer computations. In algebraic abstraction, programs are lifted to polynomial equations in the abstract domain. ...

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  14. Chapter and Conference Paper

    Kratos2: An SMT-Based Model Checker for Imperative Programs

    This paper describes Kratos2, a tool for the verification of imperative programs. Kratos2 operates on an intermediate verification language called K2, with a formally-specified semantics based on smt, allowing th...

    Alberto Griggio, Martin Jonáš in Computer Aided Verification (2023)

  15. Chapter and Conference Paper

    Learning Assumptions for Compositional Verification of Timed Automata

    Compositional verification, such as the technique of assume-guarantee reasoning (AGR), is to verify a property of a system from the properties of its components. It is essential to address the state explosion ...

    Hanyue Chen, Yu Su, Miaomiao Zhang, Zhiming Liu, Junri Mi in Computer Aided Verification (2023)

  16. Chapter and Conference Paper

    Road Network Representation Learning with Vehicle Trajectories

    Spatio-temporal traffic patterns reflecting the mobility behavior of road users are essential for learning effective general-purpose road representations. Such patterns are largely neglected in state-of-the-ar...

    Stefan Schestakov, Paul Heinemeyer in Advances in Knowledge Discovery and Data M… (2023)

  17. Chapter and Conference Paper

    Early Verification of Legal Compliance via Bounded Satisfiability Checking

    Legal properties involve reasoning about data values and time. Metric first-order temporal logic (MFOTL) provides a rich formalism for specifying legal properties. While MFOTL has been successfully used for ve...

    Nick Feng, Lina Marsso, Mehrdad Sabetzadeh, Marsha Chechik in Computer Aided Verification (2023)

  18. Chapter and Conference Paper

    Ownership Guided C to Rust Translation

    Dubbed a safer C, Rust is a modern programming language that combines memory safety and low-level control. This interesting combination has made Rust very popular among developers and there is a growing trend ...

    Hanliang Zhang, Cristina David, Yijun Yu, Meng Wang in Computer Aided Verification (2023)

  19. Chapter and Conference Paper

    Process Equivalence Problems as Energy Games

    We characterize all common notions of behavioral equivalence by one 6-dimensional energy game, where energies bound capabilities of an attacker trying to tell processes apart. The defender-winning initial credits...

    Benjamin Bis** in Computer Aided Verification (2023)

  20. Chapter and Conference Paper

    Fast Termination and Workflow Nets

    Petri nets are an established model of concurrency. A Petri net is terminating if for every initial marking there is a uniform bound on the length of all possible runs. Recent work on the termination of Petri ...

    Piotr Hofman, Filip Mazowiecki, Philip Offtermatt in Computer Aided Verification (2023)

previous disabled Page of 261