Sciweavers

2351 search results - page 154 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
COMPSAC
2010
IEEE
15 years 1 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
ISBI
2006
IEEE
16 years 5 months ago
Application of temporal texture features to automated analysis of protein subcellular locations in time series fluorescence micr
Protein subcellular locations, as an important property of proteins, are commonly learned using fluorescence microscopy. Previous work by our group has shown that automated analys...
Yanhua Hu, Jesus Carmona, Robert F. Murphy
ICTAC
2005
Springer
15 years 10 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
ICCAD
2000
IEEE
169views Hardware» more  ICCAD 2000»
15 years 9 months ago
Transistor-Level Timing Analysis Using Embedded Simulation
A high accuracy system for transistor-level static timing analysis is presented. Accurate static timing verification requires that individual gate and interconnect delays be accu...
Pawan Kulshreshtha, Robert Palermo, Mohammad Morta...
ATVA
2006
Springer
99views Hardware» more  ATVA 2006»
15 years 8 months ago
Whodunit? Causal Analysis for Counterexamples
Although the counterexample returned by a model checker can help in reproducing the symptom related to a defect, a significant amount of effort is often required for the programmer...
Chao Wang, Zijiang Yang, Franjo Ivancic, Aarti Gup...