Sciweavers

903 search results - page 123 / 181
» Usability inspection methods
Sort
View
102
Voted
WORM
2003
15 years 1 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
142
Voted
FORTE
1994
15 years 1 months ago
An improvement in formal verification
Critical safety and liveness properties of a concurrent system can often be proven with the help of a reachability analysis of a finite state model. This type of analysis is usual...
Gerard J. Holzmann, Doron Peled
109
Voted
BMCBI
2006
148views more  BMCBI 2006»
15 years 18 days ago
Predicting Class II MHC-Peptide binding: a kernel based approach using similarity scores
Background: Modelling the interaction between potentially antigenic peptides and Major Histocompatibility Complex (MHC) molecules is a key step in identifying potential T-cell epi...
Jesper Salomon, Darren R. Flower
124
Voted
FM
2009
Springer
134views Formal Methods» more  FM 2009»
14 years 10 months ago
Partial Order Reductions Using Compositional Confluence Detection
Abstract. Explicit state methods have proven useful in verifying safetycritical systems containing concurrent processes that run asynchronously and communicate. Such methods consis...
Frédéric Lang, Radu Mateescu
HCI
2007
15 years 2 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...