Sciweavers

313 search results - page 38 / 63
» Error Correction Based on Verification Techniques
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...
VTS
1997
IEEE
86views Hardware» more  VTS 1997»
15 years 1 months ago
Incremental logic rectification
We address the problem of rectifying an incorrect combinational circuit against a given specification. Based on the symbolic BDD techniques, we consider the rectification process,...
Shi-Yu Huang, Kuang-Chien Chen, Kwang-Ting Cheng
GCB
2006
Springer
140views Biometrics» more  GCB 2006»
15 years 1 months ago
PALMA: Perfect Alignments using Large Margin Algorithms
: Despite many years of research on how to properly align sequences in the presence of sequencing errors, alternative splicing and micro-exons, the correct alignment of mRNA sequen...
Gunnar Rätsch, Bettina Hepp, Uta Schulze, Che...
TSP
2008
107views more  TSP 2008»
14 years 9 months ago
On Energy-Based Acoustic Source Localization for Sensor Networks
In this paper, energy-based localization methods for source localization in sensor networks are examined. The focus is on least-squares-based approaches due to a good tradeoff betw...
Chartchai Meesookho, Urbashi Mitra, Shrikanth Nara...
SIGSOFT
2005
ACM
15 years 10 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken