Sciweavers

1911 search results - page 328 / 383
» Program analysis for code duplication in logic programs
Sort
View
BMCBI
2005
113views more  BMCBI 2005»
15 years 1 months ago
Pathway level analysis of gene expression using singular value decomposition
Background: A promising direction in the analysis of gene expression focuses on the changes in expression of specific predefined sets of genes that are known in advance to be rela...
John K. Tomfohr, Jun Lu, Thomas B. Kepler
SIGSOFT
2003
ACM
16 years 2 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg
SIGSOFT
2003
ACM
16 years 2 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
NDSS
2008
IEEE
15 years 8 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 8 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...