Sciweavers

1852 search results - page 183 / 371
» Block-level link analysis
Sort
View
POPL
2004
ACM
14 years 9 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
RTAS
2008
IEEE
14 years 3 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
INFOCOM
2005
IEEE
14 years 2 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
ICCSA
2005
Springer
14 years 2 months ago
A Penalized Likelihood Estimation on Transcriptional Module-Based Clustering
In this paper, we propose a new clustering procedure for high dimensional microarray data. Major difficulty in cluster analysis of microarray data is that the number of samples to ...
Ryo Yoshida, Seiya Imoto, Tomoyuki Higuchi
POS
2000
Springer
14 years 27 days ago
A Framework for Persistence-Enabled Optimization of Java Object Stores
Abstract. Aggressive optimization of programs often relies on analysis and transformation that cuts across the natural abstraction boundaries of the source programming language, su...
David Whitlock, Antony L. Hosking