Sciweavers

2026 search results - page 219 / 406
» Tools for Test Case Generation
Sort
View
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
16 years 4 months ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
ASM
2005
ASM
15 years 10 months ago
State Exploration with Multiple State Groupings
Abstract. Exploration algorithms are relevant to the industrial practice of gentest cases from an abstract state machine whose runs define the predicted behavior of the software s...
Colin Campbell, Margus Veanes
IJCV
2008
106views more  IJCV 2008»
15 years 4 months ago
Evaluation of Localized Semantics: Data, Methodology, and Experiments
We present a new data set encoding localized semantics for 1014 images and a methodology for using this kind of data for recognition evaluation. This methodology establishes protoc...
Kobus Barnard, Quanfu Fan, Ranjini Swaminathan, An...
TODAES
2002
134views more  TODAES 2002»
15 years 4 months ago
False-noise analysis using logic implications
ct Cross-coupled noise analysis has become a critical concern in today's VLSI designs. Typically, noise analysis makes an assumption that all aggressing nets can simultaneousl...
Alexey Glebov, Sergey Gavrilov, David Blaauw, Vlad...
I3E
2001
196views Business» more  I3E 2001»
15 years 5 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel