Sciweavers

1541 search results - page 270 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
ICCS
2009
Springer
15 years 7 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
BMCBI
2010
158views more  BMCBI 2010»
15 years 18 days ago
A Bayesian network approach to feature selection in mass spectrometry data
Background: Time-of-flight mass spectrometry (TOF-MS) has the potential to provide non-invasive, high-throughput screening for cancers and other serious diseases via detection of ...
Karl W. Kuschner, Dariya I. Malyarenko, William E....
SIGSOFT
2007
ACM
16 years 1 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
138
Voted
LOGCOM
2011
14 years 3 months ago
Introducing Preferences in Planning as Satisfiability
Planning as Satisfiability is one of the most well-known and effective techniques for classical planning: satplan has been the winning system in the deterministic track for optim...
Enrico Giunchiglia, Marco Maratea
USS
2008
15 years 2 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian