Sciweavers

571 search results - page 87 / 115
» Performing causality analysis by bounded model checking
Sort
View
90
Voted
BMCBI
2007
139views more  BMCBI 2007»
14 years 11 months ago
Significance analysis of microarray transcript levels in time series experiments
Background: Microarray time series studies are essential to understand the dynamics of molecular events. In order to limit the analysis to those genes that change expression over ...
Barbara Di Camillo, Gianna Toffolo, Sreekumaran K....
117
Voted
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
15 years 5 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
TVCG
2012
195views Hardware» more  TVCG 2012»
13 years 2 months ago
Restricted Trivariate Polycube Splines for Volumetric Data Modeling
—This paper presents a volumetric modeling framework to construct a novel spline scheme called restricted trivariate polycube splines (RTP-splines). The RTP-spline aims to genera...
Kexiang Wang, Xin Li, Bo Li 0014, Huanhuan Xu, Hon...
ICSE
2005
IEEE-ACM
15 years 12 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
GLOBECOM
2007
IEEE
15 years 6 months ago
Clustered K-Center: Effective Replica Placement in Peer-to-Peer Systems
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
Jian Zhou, Xin Zhang, Laxmi N. Bhuyan, Bin Liu