Sciweavers

631 search results - page 101 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
JOC
2008
86views more  JOC 2008»
13 years 7 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
SQJ
2002
110views more  SQJ 2002»
13 years 7 months ago
A General Model of Unit Testing Efficacy
Much of software engineering is targeted towards identifying and removing existing defects while preventing the injection of new ones. Defect management is therefore one important ...
Houman Younessi, Panlop Zeephongsekul, Winai Bodhi...
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
BMCBI
2007
153views more  BMCBI 2007»
13 years 7 months ago
MPHASYS: a mouse phenotype analysis system
Background: Systematic, high-throughput studies of mouse phenotypes have been hampered by the inability to analyze individual animal data from a multitude of sources in an integra...
R. Brent Calder, Rudolf B. Beems, Harry van Steeg,...
BMCBI
2010
74views more  BMCBI 2010»
13 years 7 months ago
Correcting for the effects of natural abundance in stable isotope resolved metabolomics experiments involving ultra-high resolut
Background: Stable isotope tracing with ultra-high resolution Fourier transform-ion cyclotron resonance-mass spectrometry (FT-ICR-MS) can provide simultaneous determination of hun...
Hunter N. B. Moseley