Sciweavers

2835 search results - page 259 / 567
» Common Semantics for Use Cases and Task Models
Sort
View
DSN
2009
IEEE
15 years 11 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
FDL
2006
IEEE
15 years 11 months ago
Reusing Real-Time Systems Design Experience
To ensure correctness and performance of real-time embedded systems, early evaluation of properties is needed. Based on design experience for real-time systems and using the conce...
Oana Florescu, Jeroen Voeten, Marcel Verhoef, Henk...
IJISTA
2007
136views more  IJISTA 2007»
15 years 4 months ago
Optimisation-on-a-manifold for global registration of multiple 3D point sets
: We propose a novel algorithm to register multiple 3D point sets within a common reference frame simultaneously. Our approach performs an explicit optimisation on the manifold of ...
Shankar Krishnan, Pei Yean Lee, John B. Moore, Sur...
ISSTA
2009
ACM
15 years 11 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
BMCBI
2004
117views more  BMCBI 2004»
15 years 4 months ago
CisOrtho: A program pipeline for genome-wide identification of transcription factor target genes using phylogenetic footprinting
Background: All known genomes code for a large number of transcription factors. It is important to develop methods that will reveal how these transcription factors act on a genome...
Henry R. Bigelow, Adam S. Wenick, Allan Wong, Oliv...