Sciweavers

1541 search results - page 268 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
BMCBI
2008
123views more  BMCBI 2008»
15 years 18 days ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
AGTIVE
2007
Springer
15 years 4 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
VL
2005
IEEE
159views Visual Languages» more  VL 2005»
15 years 6 months ago
Executable Visual Contracts
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely ...
Marc Lohmann, Stefan Sauer, Gregor Engels
112
Voted
SIGSOFT
2009
ACM
15 years 7 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...
SIGSOFT
2010
ACM
14 years 10 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...