Sciweavers

247 search results - page 49 / 50
» Event Based Sequential Program Development: Application to C...
Sort
View
CADE
2001
Springer
14 years 6 months ago
More On Implicit Syntax
Proof assistants based on type theories, such as Coq and Lego, allow users to omit subterms on input that can be inferred automatically. While those mechanisms are well known, ad-h...
Marko Luther
EUROSYS
2009
ACM
14 years 3 months ago
Dingo: taming device drivers
Device drivers are notorious for being a major source of failure in operating systems. In analysing a sample of real defects in Linux drivers, we found that a large proportion (39...
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heise...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 10 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
WSC
2007
13 years 8 months ago
Using ontologies for simulation integration
This paper describes the motivations, methods, and solution concepts for the use of ontologies for simulation model integration. Ontological analysis has been shown to be an effec...
Perakath C. Benjamin, Kumar V. Akella, Ajay Verma
BMCBI
2005
127views more  BMCBI 2005»
13 years 6 months ago
Dynamic modeling of cis-regulatory circuits and gene expression prediction via cross-gene identification
Background: Gene expression programs depend on recognition of cis elements in promoter region of target genes by transcription factors (TFs), but how TFs regulate gene expression ...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...