Sciweavers

2357 search results - page 166 / 472
» Computing Refactorings of Behavior Models
Sort
View
130
Voted
ICFP
2006
ACM
16 years 4 months ago
Programming monads operationally with Unimo
Monads are widely used in Haskell for modeling computational effects, but defining monads remains a daunting challenge. Since every part of a monad's definition depends on it...
Chuan-Kai Lin
DAC
1996
ACM
15 years 8 months ago
Efficient Partial Enumeration for Timing Analysis of Asynchronous Systems
-- This paper presents an efficient method for the timing verification of concurrent systems, modeled as labeled Timed Petri nets. The verification problems we consider require us ...
Eric Verlind, Gjalt G. de Jong, Bill Lin
CW
2003
IEEE
15 years 9 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ACMICEC
2007
ACM
225views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
The game of scale: decision making with economies of scale
While diffusion of innovation topics in economics and majority games in game theory have been widely studied, the impact of economy-of-scale effects in aggregated decision making ...
Christopher J. Hazard, Peter R. Wurman
BMCBI
2007
103views more  BMCBI 2007»
15 years 4 months ago
Dynamic simulation of regulatory networks using SQUAD
Background: The ambition of most molecular biologists is the understanding of the intricate network of molecular interactions that control biological systems. As scientists uncove...
Alessandro Di Cara, Abhishek Garg, Giovanni De Mic...