Sciweavers

577 search results - page 91 / 116
» Model Checking Based on Simultaneous Reachability Analysis
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
13 years 10 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
QEST
2009
IEEE
14 years 5 months ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
14 years 10 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
BMCBI
2005
212views more  BMCBI 2005»
13 years 10 months ago
PAGE: Parametric Analysis of Gene Set Enrichment
Background: Gene set enrichment analysis (GSEA) is a microarray data analysis method that uses predefined gene sets and ranks of genes to identify significant biological changes i...
Seon-Young Kim, David J. Volsky
DAC
1998
ACM
14 years 2 months ago
OCCOM: Efficient Computation of Observability-Based Code Coverage Metrics for Functional Verification
—Functional simulation is still the primary workhorse for verifying the functional correctness of hardware designs. Functional verification is necessarily incomplete because it i...
Farzan Fallah, Srinivas Devadas, Kurt Keutzer