Sciweavers

731 search results - page 133 / 147
» Specification Matching of Software Components
Sort
View
TSE
2010
230views more  TSE 2010»
14 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
ICDT
2010
ACM
205views Database» more  ICDT 2010»
15 years 2 months ago
On the Aggregation Problem for Synthesized Web Services
The paper formulates and investigates the aggregation problem for synthesized mediators of Web services (SWMs). An SWM is a finite-state transducer defined in terms of templates...
Ting Deng, Wenfei Fan, Leonid Libkin, Yinghui Wu
EJC
2003
14 years 11 months ago
A Theory of Signs for Database Semantics
The goal of this paper is to build a bridge from a certain intuitive conception of natural language communication, called the SLIM theory of language, to a technical approach, cal...
Roland Hausser
BMCBI
2007
120views more  BMCBI 2007»
14 years 9 months ago
Transcript-based redefinition of grouped oligonucleotide probe sets using AceView: High-resolution annotation for microarrays
Background: Extracting biological information from high-density Affymetrix arrays is a multi-step process that begins with the accurate annotation of microarray probes. Shortfalls...
Jun Lu, Joseph C. Lee, Marc L. Salit, Margaret C. ...
ASAP
2007
IEEE
157views Hardware» more  ASAP 2007»
15 years 1 months ago
Automatic Generation and Optimisation of Reconfigurable Financial Monte-Carlo Simulations
Monte-Carlo simulations are used in many applications, such as option pricing and portfolio evaluation. Due to their high computational load and intrinsic parallelism, they are id...
David B. Thomas, Jacob A. Bower, Wayne Luk