Sciweavers

2210 search results - page 404 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
AOSD
2009
ACM
14 years 3 months ago
Modelling hardware verification concerns specified in the e language: an experience report
e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In rec...
Darren Galpin, Cormac Driver, Siobhán Clark...
BMCBI
2006
110views more  BMCBI 2006»
13 years 9 months ago
Modelling the network of cell cycle transcription factors in the yeast Saccharomyces cerevisiae
Background: Reverse-engineering regulatory networks is one of the central challenges for computational biology. Many techniques have been developed to accomplish this by utilizing...
Shawn Cokus, Sherri Rose, David Haynor, Niels Gr&o...
ESORICS
2004
Springer
14 years 2 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
RV
2010
Springer
177views Hardware» more  RV 2010»
13 years 7 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 3 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...