Sciweavers

886 search results - page 116 / 178
» Generalized Bezout Identity
Sort
View
FM
2003
Springer
109views Formal Methods» more  FM 2003»
14 years 2 months ago
Certifying and Synthesizing Membership Equational Proofs
As the systems we have to specify and verify become larger and more complex, there is a mounting need to combine different tools and decision procedures to accomplish large proof ...
Grigore Rosu, Steven Eker, Patrick Lincoln, Jos&ea...
GCB
2003
Springer
82views Biometrics» more  GCB 2003»
14 years 2 months ago
Threshold extraction in metabolite concentration data
The further development of analytical techniques based on gas chromatography and mass spectrometry now facilitate the generation of larger sets of metabolite concentration data. T...
André Flöter, Jacques Nicolas, Torsten...
PASTE
2010
ACM
14 years 2 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
APSEC
2002
IEEE
14 years 2 months ago
On Detection of Gapped Code Clones using Gap Locations
It is generally said that code clone is one of the factors to make software maintenance difficult. A code clone is a code portion in source files that is identical or similar to...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
COMPSAC
2002
IEEE
14 years 2 months ago
Rights Protection for Digital Contents Redistribution Over the Internet
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
Shing-Chi Cheung, Hanif Curreem