Sciweavers

2695 search results - page 202 / 539
» The Complexity of Forecast Testing
Sort
View
JCS
2008
109views more  JCS 2008»
15 years 4 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
144
Voted
JSS
2007
169views more  JSS 2007»
15 years 4 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
ISAMI
2010
15 years 2 months ago
A Data Mining Approach for the Detection of High-Risk Breast Cancer Groups
It is widely agreed that complex diseases are typically caused by the joint effects of multiple instead of a single genetic variation. These genetic variations may show very little...
Orlando Anunciação, Bruno C. Gomes, ...
INFSOF
2010
146views more  INFSOF 2010»
15 years 2 months ago
Links between the personalities, views and attitudes of software engineers
Successful software development and management depends not only on the technologies, methods and processes employed but also on the judgments and decisions of the humans involved....
Robert Feldt, Lefteris Angelis, Richard Torkar, Ma...

Book
537views
17 years 2 months ago
How to Think Like a Computer Scientist: Java Version
""The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mat...
Allen B. Downey