Sciweavers

1486 search results - page 146 / 298
» Firewall Rules Analysis
Sort
View
POPL
2010
ACM
16 years 1 months ago
Continuity Analysis of Programs
We present an analysis to automatically determine if a program represents a continuous function, or equivalently, if infinitesimal changes to its inputs can only cause infinitesim...
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerm...
DOCENG
2009
ACM
15 years 11 months ago
Web document text and images extraction using DOM analysis and natural language processing
: © Web Document Text and Images Extraction using DOM Analysis and Natural Language Processing Parag Mulendra Joshi, Sam Liu HP Laboratories HPL-2009-187 Web page text extraction,...
Parag Mulendra Joshi, Sam Liu
HYBRID
2010
Springer
15 years 11 months ago
Compositional analysis for linear control systems
The complexity of physical and engineering systems, both in terms of the governing physical phenomena and the number of subprocesses involved, is mirrored in ever more complex mat...
Florian Kerber, Arjan van der Schaft
CANDC
2005
ACM
15 years 4 months ago
Comments on selected fundamental aspects of microarray analysis
Microarrays are becoming a ubiquitous tool of research in life sciences. However, the working principles of microarray-based methodologies are often misunderstood or apparently ig...
Alessandra Riva, Anne-Sophie Carpentier, Bruno Tor...
SIGSOFT
2004
ACM
15 years 9 months ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite eï¬...
Jürgen Dingel, Hongzhi Liang