Sciweavers

70 search results - page 13 / 14
» System-Level Verification - A Comparison of Approaches
Sort
View
DSN
2004
IEEE
13 years 9 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
BMCBI
2010
149views more  BMCBI 2010»
13 years 6 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
BMCBI
2008
83views more  BMCBI 2008»
13 years 6 months ago
Prioritization of gene regulatory interactions from large-scale modules in yeast
Background: The identification of groups of co-regulated genes and their transcription factors, called transcriptional modules, has been a focus of many studies about biological s...
Ho-Joon Lee, Thomas Manke, Ricardo Bringas, Martin...
EKAW
2000
Springer
13 years 9 months ago
Torture Tests: A Quantitative Analysis for the Robustness of Knowledge-Based Systems
Abstract. The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Know...
Perry Groot, Frank van Harmelen, Annette ten Teije
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 5 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...