Sciweavers

2043 search results - page 408 / 409
» Reasoning About Security Models
Sort
View
ENTCS
2006
138views more  ENTCS 2006»
14 years 10 months ago
Variables as Resource in Separation Logic
Separation logic [20,21,14] began life as an extended formalisation of Burstall's treatment of list-mutating programs [8]. It rapidly became clear that there was more that it...
Richard Bornat, Cristiano Calcagno, Hongseok Yang
BMCBI
2007
133views more  BMCBI 2007»
14 years 10 months ago
Semi-supervised learning for the identification of syn-expressed genes from fused microarray and in situ image data
Background: Gene expression measurements during the development of the fly Drosophila melanogaster are routinely used to find functional modules of temporally co-expressed genes. ...
Ivan G. Costa, Roland Krause, Lennart Opitz, Alexa...
IJSWIS
2006
168views more  IJSWIS 2006»
14 years 10 months ago
Unraveling the Taste Fabric of Social Networks
Popular online social networks such as Friendster and MySpace do more than simply reveal the superficial structure of social connectedness--the rich meanings bottled within social...
Hugo Liu, Pattie Maes, Glorianna Davenport
TAP
2008
Springer
93views Hardware» more  TAP 2008»
14 years 10 months ago
Pex-White Box Test Generation for .NET
Pex automatically produces a small test suite with high code coverage for a .NET program. To this end, Pex performs a systematic program analysis (using dynamic symbolic execution,...
Nikolai Tillmann, Jonathan de Halleux
LOGCOM
2000
63views more  LOGCOM 2000»
14 years 9 months ago
Reflection principles in computational logic
We introduce the concept of reflection principle as a knowledge representation paradigm in a computational logic setting. Reflection principles are expressed as certain kinds of l...
Jonas Barklund, Pierangelo Dell'Acqua, Stefania Co...