Sciweavers

4307 search results - page 423 / 862
» Dynamic Spyware Analysis
Sort
View
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 9 months ago
H2 performance of agreement protocol with noise: An edge based approach
— This work presents an H2 performance analysis of the agreement protocol in the presence of noise. The agreement protocol is first transformed into an equivalent system induced...
Daniel Zelazo, Mehran Mesbahi
WSC
2008
15 years 6 months ago
Analytical simulation modeling
Simulation modeling methodology research and simulation analysis methodology research have evolved into two nearly separate fields. In this paper, ways are shown how simulation mi...
Lee Schruben
LISP
2008
154views more  LISP 2008»
15 years 4 months ago
Types and trace effects for object orientation
Trace effects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type a...
Christian Skalka
RV
2010
Springer
220views Hardware» more  RV 2010»
15 years 2 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
BMCBI
2010
193views more  BMCBI 2010»
14 years 11 months ago
Mayday - integrative analytics for expression data
Background: DNA Microarrays have become the standard method for large scale analyses of gene expression and epigenomics. The increasing complexity and inherent noisiness of the ge...
Florian Battke, Stephan Symons, Kay Nieselt