Sciweavers

2006 search results - page 55 / 402
» Heuristic Security-Testing Methods
Sort
View
142
Voted
SBMF
2010
Springer
129views Formal Methods» more  SBMF 2010»
14 years 11 months ago
Directed Model Checking for B: An Evaluation and New Techniques
ProB is a model checker for high-level formalisms such as B, Event-B, CSP and Z. ProB uses a mixed depth-first/breadth-first search strategy, and in previous work we have argued th...
Michael Leuschel, Jens Bendisposto
CC
2012
Springer
227views System Software» more  CC 2012»
14 years 9 days ago
Programming Paradigm Driven Heap Analysis
The computational cost and precision of a shape style heap analysis is highly dependent on the way method calls are handled. This paper introduces a new approach to analyzing metho...
Mark Marron, Ondrej Lhoták, Anindya Banerje...
ACL
2012
13 years 7 months ago
Reducing Wrong Labels in Distant Supervision for Relation Extraction
In relation extraction, distant supervision seeks to extract relations between entities from text by using a knowledge base, such as Freebase, as a source of supervision. When a s...
Shingo Takamatsu, Issei Sato, Hiroshi Nakagawa
SIAMSC
2008
193views more  SIAMSC 2008»
15 years 4 months ago
Exact and Approximate Sparse Solutions of Underdetermined Linear Equations
Abstract. In this paper, we empirically investigate the NP-hard problem of finding sparsest solutions to linear equation systems, i.e., solutions with as few nonzeros as possible. ...
Sadegh Jokar, Marc E. Pfetsch
212
Voted
BMCBI
2011
14 years 8 months ago
Study of large and highly stratified population datasets by combining iterative pruning principal component analysis and STRUCTU
Background: The ever increasing sizes of population genetic datasets pose great challenges for population structure analysis. The Tracy-Widom (TW) statistical test is widely used ...
Tulaya Limpiti, Apichart Intarapanich, Anunchai As...