Sciweavers

650 search results - page 30 / 130
» Analysis and design of sequencing rules for car sequencing
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
CADE
2009
Springer
15 years 10 months ago
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs
Abstract. An approach based on term rewriting techniques for the automated termination analysis of imperative programs operating on integers is presented. An imperative program is ...
Stephan Falke, Deepak Kapur
JCP
2008
145views more  JCP 2008»
14 years 9 months ago
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks
The mining of weighted association rules is one of the primary methods used in communication alarm correlation analysis. With large communication alarm database, the traditional me...
Jian Wu, Xing ming Li
JCP
2008
142views more  JCP 2008»
14 years 9 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
PRIB
2009
Springer
113views Bioinformatics» more  PRIB 2009»
15 years 4 months ago
c-GAMMA: Comparative Genome Analysis of Molecular Markers
Discovery of molecular markers for efficient identification of living organisms remains a challenge of high interest. The diversity of species can now be observed in details with ...
Pierre Peterlongo, Jacques Nicolas, Dominique Lave...