Sciweavers

2006 search results - page 55 / 402
» Heuristic Security-Testing Methods
Sort
View
108
Voted
SBMF
2010
Springer
129views Formal Methods» more  SBMF 2010»
14 years 7 months ago
Directed Model Checking for B: An Evaluation and New Techniques
ProB is a model checker for high-level formalisms such as B, Event-B, CSP and Z. ProB uses a mixed depth-first/breadth-first search strategy, and in previous work we have argued th...
Michael Leuschel, Jens Bendisposto
CC
2012
Springer
227views System Software» more  CC 2012»
13 years 8 months ago
Programming Paradigm Driven Heap Analysis
The computational cost and precision of a shape style heap analysis is highly dependent on the way method calls are handled. This paper introduces a new approach to analyzing metho...
Mark Marron, Ondrej Lhoták, Anindya Banerje...
105
Voted
ACL
2012
13 years 2 months ago
Reducing Wrong Labels in Distant Supervision for Relation Extraction
In relation extraction, distant supervision seeks to extract relations between entities from text by using a knowledge base, such as Freebase, as a source of supervision. When a s...
Shingo Takamatsu, Issei Sato, Hiroshi Nakagawa
SIAMSC
2008
193views more  SIAMSC 2008»
15 years 14 days ago
Exact and Approximate Sparse Solutions of Underdetermined Linear Equations
Abstract. In this paper, we empirically investigate the NP-hard problem of finding sparsest solutions to linear equation systems, i.e., solutions with as few nonzeros as possible. ...
Sadegh Jokar, Marc E. Pfetsch
163
Voted
BMCBI
2011
14 years 4 months ago
Study of large and highly stratified population datasets by combining iterative pruning principal component analysis and STRUCTU
Background: The ever increasing sizes of population genetic datasets pose great challenges for population structure analysis. The Tracy-Widom (TW) statistical test is widely used ...
Tulaya Limpiti, Apichart Intarapanich, Anunchai As...