Sciweavers

10715 search results - page 1991 / 2143
» From Tests to Proofs
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
SIGSOFT
2007
ACM
14 years 9 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
SIGSOFT
2004
ACM
14 years 9 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
ISBI
2004
IEEE
14 years 9 months ago
Nanoparticle-Enhanced Proton Computed Tomography: A Monte Carlo Simulation Study
Proton computed tomography (pCT) has the potential to improve the accuracy of proton treatment planning, which is currently based on x-ray computed tomography (xCT). However, at t...
Reinhard Schulte, Vladimir Bashkirov, David Willia...
ISBI
2008
IEEE
14 years 9 months ago
Axonal bouton modeling, detection and distribution analysis for the study of neural circuit organization and plasticity
We propose a novel method for axonal bouton modeling and automated detection in populations of labeled neurons, as well as bouton distribution analysis for the study of neural cir...
Abhay Mavalankar, Amina Chebira, Christina A. Hall...
« Prev « First page 1991 / 2143 Last » Next »