Sciweavers

1644 search results - page 265 / 329
» Finding Dominators in Practice
Sort
View
TAP
2010
Springer
134views Hardware» more  TAP 2010»
13 years 5 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 5 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
EUSFLAT
2009
343views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Towards an Interpretation of the Connectivity Analysis in the Frame of Fuzzy Equivalence Relations for Medical Diagnoses
Connectivity analysis methodology is suitable to find representative symptoms of a disease. This methodology describes connections between symptoms in particular way and then choos...
Tatiana Kiseliova
HCI
2009
13 years 5 months ago
Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies
This paper describes our work in developing a movie browser application for students of Film Studies at our University. The aim of our work is to address the issues that arise when...
Nazlena Mohamad Ali, Alan F. Smeaton, Hyowon Lee, ...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
13 years 5 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...