Sciweavers

883 search results - page 137 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
ISSTA
2006
ACM
14 years 1 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
OOPSLA
2004
Springer
14 years 28 days ago
Chianti: a tool for change impact analysis of java programs
This paper reports on the design and implementation of Chianti, a change impact analysis tool for Java that is implemented in the context of the Eclipse environment. Chianti analy...
Xiaoxia Ren, Fenil Shah, Frank Tip, Barbara G. Ryd...
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Using Generalized Procrustes Analysis (GPA) for normalization of cDNA microarray data
Background: Normalization is essential in dual-labelled microarray data analysis to remove nonbiological variations and systematic biases. Many normalization methods have been use...
Huiling Xiong, Dapeng Zhang, Christopher J. Martyn...
BMCBI
2008
99views more  BMCBI 2008»
13 years 7 months ago
Ranking analysis of F-statistics for microarray data
Background: Microarray technology provides an efficient means for globally exploring physiological processes governed by the coordinated expression of multiple genes. However, ide...
Yuan-De Tan, Myriam Fornage, Hongyan Xu