Sciweavers

963 search results - page 12 / 193
» Escape Analysis on Lists
Sort
View
DATE
1997
IEEE
116views Hardware» more  DATE 1997»
15 years 2 months ago
A new approach to build a low-level malicious fault list starting from high-level description and alternative graphs
In this paper a new approach is presented to build a list of faults to be used by the fault injection environment; the list is built starting from a high-level description of the ...
Alfredo Benso, Paolo Prinetto, Maurizio Rebaudengo...
CAV
2006
Springer
133views Hardware» more  CAV 2006»
15 years 1 months ago
Programs with Lists Are Counter Automata
Abstract. We address the verification problem of programs manipulating oneselector linked data structures. We propose a new automated approach for checking safety and termination f...
Ahmed Bouajjani, Marius Bozga, Peter Habermehl, Ra...
SODA
2007
ACM
145views Algorithms» more  SODA 2007»
14 years 11 months ago
Aggregation of partial rankings, p-ratings and top-m lists
We study the problem of aggregating partial rankings. This problem is motivated by applications such as meta-searching and information retrieval, search engine spam fighting, e-c...
Nir Ailon
ICML
2000
IEEE
15 years 10 months ago
Learning to Create Customized Authority Lists
The proliferation of hypertext and the popularity of Kleinberg's HITS algorithm have brought about an increased interest in link analysis. While HITS and its older relatives ...
Huan Chang, David Cohn, Andrew McCallum
BMCBI
2007
117views more  BMCBI 2007»
14 years 10 months ago
Meta-analysis of several gene lists for distinct types of cancer: A simple way to reveal common prognostic markers
Background: Although prognostic biomarkers specific for particular cancers have been discovered, microarray analysis of gene expression profiles, supported by integrative analysis...
Xinan Yang, Xiao Sun