We propose a two-stage approach for TOC generation from financial documents. This work connected with participation in FinTOC-2021 Shared Task: "Financial Document Structure Extraction". The competition cont...
详细信息
The paper presents a novel approach to automated compiler test suite generation based on the source level specification. Several coverage criteria are introduced. The application of the proposed methodology to testing...
详细信息
In this paper an approach to testbench development for synchronous parallel-pipeline designs is considered. The approach is based on cycle-accurate formal specifications of a design under verification. Specifications ...
详细信息
In this work we evaluate applicability of entity pair models and neural network architectures for relation extraction and classification in scientific papers at SemEval-2018. We carry out experiments with representing...
详细信息
The component approach to creation of systems and sites from ready resources (components, objects, services and reuses) is considered. The approach is based on the graph and component model (CM), which includes functi...
详细信息
Test generation is an important issue when checking functional and nonfunctional requirements for components of distributed systems and formal models are utilized in order to derive test suites with guaranteed fault c...
详细信息
Crash report analysis is a necessary step before developers begin fixing errors. Fuzzing or hybrid (with dynamic symbolic execution) fuzzing is often used in the secure Development lifecycle. Modern fuzzers could prod...
详细信息
Interactive rendering of 3D scenes with a big number of objects is computationally intensive. It is hard to determine an efficient way of rendering command recording and submission. Command buffers can be recorded eac...
详细信息
We present a family of asymptotically good packings of l-subsets of an n-set by k-subsets and an algorithm that given a natural i finds the ith k-subset of this family. The bit complexity of this algorithm is almost l...
详细信息
In the last 15 years many dedicated leak detection tools utilizing novel approaches were designed. Unfortunately, most of them are hard to implement and fully utilize in the scope of a multi-purpose industrial analyze...
详细信息
暂无评论