Sciweavers

3639 search results - page 81 / 728
» Provenance as Dependency Analysis
Sort
View
VLDB
2007
ACM
104views Database» more  VLDB 2007»
15 years 10 months ago
Extending Dependencies with Conditions
This paper introduces a class of conditional inclusion dependencies (CINDs), which extends traditional inclusion dependencies (INDs) by enforcing bindings of semantically related ...
Loreto Bravo, Wenfei Fan, Shuai Ma
BMCBI
2011
14 years 1 months ago
Linear and non-linear dependencies between copy number aberrations and mRNA expression reveal distinct molecular pathways in Bre
Background: Elucidating the exact relationship between gene copy number and expression would enable identification of regulatory mechanisms of abnormal gene expression and biologi...
Hiroko K. Solvang, Ole Christian Lingjærde, ...
ICALP
2001
Springer
15 years 2 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
15 years 2 months ago
A Source-Level Dynamic Analysis Methodology and Tool for High-Level Synthesis
This paper presents a novel source-level dynamic analysis methodology and tool for High-Level Synthesis (HLS). It not only for the first time enables HLS to offer source-level de...
Chih-Tung Chen, Kayhan Küçük&cced...
ENTCS
2006
154views more  ENTCS 2006»
14 years 10 months ago
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card
We present a semantics-based technique for modeling and analysing resource usage behaviour of programs written in a simple object oriented language like Java e code. The approach ...
Pascal Sotin, David Cachera, Thomas P. Jensen