Sciweavers

963 search results - page 69 / 193
» Escape Analysis on Lists
Sort
View
116
Voted
EMSOFT
2006
Springer
15 years 4 months ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
GECCO
2006
Springer
132views Optimization» more  GECCO 2006»
15 years 4 months ago
The role of diverse populations in phylogenetic analysis
The most popular approaches for reconstructing phylogenetic trees attempt to solve NP-hard optimization criteria such as maximum parsimony (MP). Currently, the bestperforming heur...
Tiffani L. Williams, Marc L. Smith
108
Voted
CCS
2008
ACM
15 years 2 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
IMC
2007
ACM
15 years 2 months ago
Acyclic type-of-relationship problems on the internet: an experimental analysis
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
Benjamin Hummel, Sven Kosub
BMCBI
2010
154views more  BMCBI 2010»
15 years 21 days ago
Candidate gene prioritization by network analysis of differential expression using machine learning approaches
Background: Discovering novel disease genes is still challenging for diseases for which no prior knowledge - such as known disease genes or disease-related pathways - is available...
Daniela Nitsch, Joana P. Gonçalves, Fabian ...