Sciweavers

963 search results - page 141 / 193
» $M$-Solid Varieties of Languages
Sort
View
RTA
2009
Springer
14 years 3 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
WCRE
2008
IEEE
14 years 3 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
BIBM
2007
IEEE
144views Bioinformatics» more  BIBM 2007»
14 years 3 months ago
Kinetic Modeling Using BioPAX Ontology
Thousands of biochemical interactions are available for download from curated databases such as Reactome, Pathway Interaction Database and other sources in the Biological Pathways...
Oliver Ruebenacker, Ion I. Moraru, James C. Schaff...
CRV
2007
IEEE
146views Robotics» more  CRV 2007»
14 years 3 months ago
INVICON: A Toolkit for Knowledge-Based Control of Vision Systems
To perform as desired in a dynamic environment a vision system must adapt to a variety of operating conditions by selecting vision modules, tuning their parameters, and controllin...
Olena Borzenko, Yves Lespérance, Michael Je...
SCAM
2007
IEEE
14 years 3 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser