Sciweavers

2351 search results - page 416 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
134
Voted
EMSOFT
2007
Springer
15 years 10 months ago
Proving the absence of run-time errors in safety-critical avionics code
We explain the design of the interpretation-based static analyzer Astr´ee and its use to prove the absence of run-time errors in safety-critical codes. Categories and Subject Des...
Patrick Cousot
123
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya
135
Voted
GECCO
2007
Springer
194views Optimization» more  GECCO 2007»
15 years 10 months ago
Hybrid coevolutionary algorithms vs. SVM algorithms
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
Rui Li, Bir Bhanu, Krzysztof Krawiec
129
Voted
SI3D
2005
ACM
15 years 9 months ago
Level-of-detail representation of bidirectional texture functions for real-time rendering
This paper presents a new technique for rendering bidirectional texture functions (BTFs) at different levels of detail (LODs). Our method first decomposes each BTF image into mul...
Wan-Chun Ma, Sung-Hsiang Chao, Yu-Ting Tseng, Yung...
146
Voted
ISMB
2000
15 years 5 months ago
Pattern Recognition of Genomic Features with Microarrays: Site Typing of Mycobacterium Tuberculosis Strains
Mycobacterium tuberculosis (M. tb.) strains differ in the number and locations of a transposon-like insertion sequence known as IS6110. Accurate detection of this sequence can be ...
Soumya Raychaudhuri, Joshua M. Stuart, Xuemin Liu,...