Sciweavers

3706 search results - page 404 / 742
» The Transformational Approach to Program Development
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 5 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
HASE
2008
IEEE
15 years 11 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Using Parallel Algorithms for Searching Molecular Sequence Databases
This work presents the development of algorithms for approximate string matching using parallel methods. It intends to do the maximum of molecular sequences comparisons per unity ...
Carla Correa Tavares dos Reis, Rubem P. Mondaini
ISW
2005
Springer
15 years 10 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
GECCO
2006
Springer
143views Optimization» more  GECCO 2006»
15 years 8 months ago
Hybrid search for cardinality constrained portfolio optimization
In this paper, we describe how a genetic algorithm approach added to a simulated annealing (SA) process offers a better alternative to find the mean variance frontier in the portf...
Miguel A. Gomez, Carmen X. Flores, Maria A. Osorio