Sciweavers

495 search results - page 56 / 99
» An Approach to Integration Testing Based on Data Flow Specif...
Sort
View
151
Voted
BMCBI
2008
166views more  BMCBI 2008»
15 years 4 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
SPIN
2009
Springer
15 years 10 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
TCBB
2008
137views more  TCBB 2008»
15 years 4 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
135
Voted
CBMS
2004
IEEE
15 years 8 months ago
Toward a Systems Biology Software Toolkit
Insight to complex problems may be revealed when domain data sets are viewed or structured in new and innovative ways. Systems approaches to biomedical problems fundamentally invo...
Donald J. Johann, Michael D. McGuigan, Stanimire T...
DAC
2009
ACM
15 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou