Sciweavers

2210 search results - page 404 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
133
Voted
AOSD
2009
ACM
15 years 9 months ago
Modelling hardware verification concerns specified in the e language: an experience report
e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In rec...
Darren Galpin, Cormac Driver, Siobhán Clark...
124
Voted
BMCBI
2006
110views more  BMCBI 2006»
15 years 2 months ago
Modelling the network of cell cycle transcription factors in the yeast Saccharomyces cerevisiae
Background: Reverse-engineering regulatory networks is one of the central challenges for computational biology. Many techniques have been developed to accomplish this by utilizing...
Shawn Cokus, Sherri Rose, David Haynor, Niels Gr&o...
ESORICS
2004
Springer
15 years 7 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
130
Voted
RV
2010
Springer
177views Hardware» more  RV 2010»
15 years 18 days ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
144
Voted
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
15 years 8 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...