Sciweavers

1054 search results - page 198 / 211
» Using Component Abstraction for Automatic Generation of Macr...
Sort
View
ESOP
2005
Springer
15 years 3 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
DAS
2006
Springer
15 years 1 months ago
Script Identification from Indian Documents
Abstract. Automatic identification of a script in a given document image facilitates many important applications such as automatic archiving of multilingual documents, searching on...
Gopal Datt Joshi, Saurabh Garg, Jayanthi Sivaswamy
BMCBI
2008
153views more  BMCBI 2008»
14 years 9 months ago
2DB: a Proteomics database for storage, analysis, presentation, and retrieval of information from mass spectrometric experiments
Background: The amount of information stemming from proteomics experiments involving (multi dimensional) separation techniques, mass spectrometric analysis, and computational anal...
Jens Allmer, Sebastian Kuhlgert, Michael Hippler
SIGSOFT
2003
ACM
15 years 10 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
BMCBI
2007
145views more  BMCBI 2007»
14 years 9 months ago
Colony size measurement of the yeast gene deletion strains for functional genomics
Background: Numerous functional genomics approaches have been developed to study the model organism yeast, Saccharomyces cerevisiae, with the aim of systematically understanding t...
Negar Memarian, Matthew Jessulat, Javad Alirezaie,...