Sciweavers

890 search results - page 177 / 178
» Programming language methods in computer security
Sort
View
TPHOL
2007
IEEE
13 years 11 months ago
Verifying Nonlinear Real Formulas Via Sums of Squares
Techniques based on sums of squares appear promising as a general approach to the universal theory of reals with addition and multiplication, i.e. verifying Boolean combinations of...
John Harrison
FM
2008
Springer
152views Formal Methods» more  FM 2008»
13 years 6 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid
ICTAI
2010
IEEE
13 years 3 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
BMCBI
2011
13 years 10 days ago
pROC: an open-source package for R and S+ to analyze and compare ROC curves
Background: Receiver operating characteristic (ROC) curves are useful tools to evaluate classifiers in biomedical and bioinformatics applications. However, conclusions are often r...
Xavier Robin, Natacha Turck, Alexandre Hainard, Na...
CADE
2001
Springer
14 years 5 months ago
More On Implicit Syntax
Proof assistants based on type theories, such as Coq and Lego, allow users to omit subterms on input that can be inferred automatically. While those mechanisms are well known, ad-h...
Marko Luther