Sciweavers

528 search results - page 55 / 106
» Construction of concrete verification models from C
Sort
View
ECBS
2006
IEEE
122views Hardware» more  ECBS 2006»
14 years 2 months ago
Customer-oriented Development of Complex Distributed Systems
Complex and distributed systems are more and more common. Hardware is going from strength to strength and is embedded in high performance peer-to-peer networks mostly. The task of...
Ivonne Erfurth
ISMB
1993
13 years 10 months ago
Using Dirichlet Mixture Priors to Derive Hidden Markov Models for Protein Families
A Bayesian method for estimating the amino acid distributions in the states of a hidden Markov model (HMM) for a protein familyor the columns of a multiple alignment of that famil...
Michael Brown, Richard Hughey, Anders Krogh, I. Sa...
ALGORITHMICA
2006
161views more  ALGORITHMICA 2006»
13 years 8 months ago
The Expected Size of the Rule k Dominating Set
Dai, Li, and Wu proposed Rule k, a localized approximation algorithm that attempts to find a small connected dominating set in a graph. In this paper we consider the "average...
Jennie C. Hansen, Eric Schmutz, Li Sheng
DAWAK
2005
Springer
14 years 2 months ago
Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Alkis Simitsis, Panos Vassiliadis, Manolis Terrovi...
PADL
2004
Springer
14 years 2 months ago
Symbolic Execution of Behavioral Requirements
Message Sequence Charts (MSC) have traditionally been used as a weak form of behavioral requirements in software design; they denote scenarios which may happen. Live Sequence Chart...
Tao Wang, Abhik Roychoudhury, Roland H. C. Yap, S....