Sciweavers

4276 search results - page 60 / 856
» Techniques for Empirical Validation
Sort
View
FM
2008
Springer
192views Formal Methods» more  FM 2008»
15 years 1 months ago
CoVaC: Compiler Validation by Program Analysis of the Cross-Product
Abstract. The paper presents a deductive framework for proving program equivalence and its application to automatic verification of transformations performed by optimizing compiler...
Anna Zaks, Amir Pnueli
BMCBI
2007
99views more  BMCBI 2007»
14 years 12 months ago
Towards validating the hypothesis of phylogenetic profiling
Background: As the number of fully sequenced genome increases, the need is greater for bioinformatics to predict or annotate genes of a newly sequenced genome. Ever since Eisenber...
Raja Loganantharaj, Mazen Atwi
CASES
2010
ACM
14 years 10 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
KI
2002
Springer
14 years 11 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
16 years 4 hour ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...