Sciweavers

1855 search results - page 203 / 371
» Composing model programs for analysis
Sort
View
CSFW
1999
IEEE
15 years 7 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
108
Voted
ICSM
2009
IEEE
15 years 10 months ago
A theoretical and empirical study of EFSM dependence
Dependence analysis underpins many activities in software maintenance such as comprehension and impact analysis. As a result, dependence has been studied widely for programming la...
Kelly Androutsopoulos, Nicolas Gold, Mark Harman, ...
ECRTS
2007
IEEE
15 years 9 months ago
Cache-Aware Timing Analysis of Streaming Applications
Of late, there has been a considerable interest in models, algorithms and methodologies specifically targeted towards designing hardware and software for streaming applications. ...
Samarjit Chakraborty, Tulika Mitra, Abhik Roychoud...
ISPASS
2006
IEEE
15 years 9 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
BMCBI
2007
129views more  BMCBI 2007»
15 years 3 months ago
Integrated network reconstruction, visualization and analysis using YANAsquare
Background: Modeling of metabolic networks includes tasks such as network assembly, network overview, calculation of metabolic fluxes and testing the robustness of the network. Re...
Roland Schwarz, Chunguang Liang, Christoph Kaleta,...