Sciweavers

8647 search results - page 1345 / 1730
» The Container Selection Problem
Sort
View
151
Voted
DATE
2004
IEEE
152views Hardware» more  DATE 2004»
15 years 8 months ago
A Design Methodology for the Exploitation of High Level Communication Synthesis
In this paper we analyse some methodological concerns that have to be faced in a design flow which contains automatic synthesis phases from high-level, system descriptions. In par...
Francesco Bruschi, Massimo Bombana
135
Voted
DSN
2004
IEEE
15 years 8 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
124
Voted
MICAI
2000
Springer
15 years 8 months ago
Searching for a Solution to Program Verification=Equation Solving in CCS
Unique Fixpoint Induction, UFI, is a chief inference rule to prove the equivalence of recursive processes in CCS [7]. It plays a major role in the equational approach to verificati...
Raul Monroy, Alan Bundy, Ian Green
FLAIRS
2008
15 years 7 months ago
Building Useful Models from Imbalanced Data with Sampling and Boosting
Building useful classification models can be a challenging endeavor, especially when training data is imbalanced. Class imbalance presents a problem when traditional classificatio...
Chris Seiffert, Taghi M. Khoshgoftaar, Jason Van H...
PODS
2010
ACM
228views Database» more  PODS 2010»
15 years 6 months ago
Capturing missing tuples and missing values
Databases in real life are often neither entirely closed-world nor entirely open-world. Indeed, databases in an enterprise are typically partially closed, in which a part of the d...
Wenfei Fan, Floris Geerts
« Prev « First page 1345 / 1730 Last » Next »