Sciweavers

752 search results - page 109 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
ILC
2007
Springer
15 years 9 months ago
Towards Model-Checking Programs with Lists
Abstract. We aim at checking safety and temporal properties over models representing the behavior of programs manipulating dynamic singly-linked lists. The properties we consider n...
Alain Finkel, Étienne Lozes, Arnaud Sangnie...
119
Voted
CAD
2005
Springer
15 years 3 months ago
A new recognition model for electronic architectural drawings
Current methods for recognition and interpretation of architectural drawings are limited to either low-level analysis of paper drawings or interpretation of electronic drawings th...
Tong Lu, Chiew-Lan Tai, Feng Su, Shijie Cai
147
Voted
BMCBI
2008
166views more  BMCBI 2008»
15 years 3 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
106
Voted
ECIS
2004
15 years 5 months ago
E-learning: planned and emergent strategies
E-learning is a new strategic arena for higher education, and higher education institutions (HEIs) need to acquire the necessary competencies and capabilities to participate. Thes...
Julian M. Sims, Philip Powell, Richard T. Vidgen
104
Voted
AGILEDC
2007
IEEE
15 years 10 months ago
The Role of Incremental Change in Agile Software Processes
This paper presents a model of incremental change that consists of concept location, impact analysis, actualization, change propagation, supporting refactorings, and testing. Repe...
Neal Febbraro, Václav Rajlich