Sciweavers

142 search results - page 16 / 29
» Program obfuscation: a quantitative approach
Sort
View
ITICSE
2005
ACM
14 years 1 months ago
Teaching programming and language concepts using LEGOs
concepts more concrete. The method has two main learning outcomes: • Language Specification – The goal of the assignment is to be able to build LEGO® creations on a standard g...
Cynthia S. Hood, Dennis J. Hood
FSEN
2007
Springer
13 years 11 months ago
Model Checking Temporal Metric Specifications with Trio2Promela
Abstract. We present Trio2Promela, a tool for model checking TRIO specifications by means of Spin. TRIO is a linear-time temporal logic with both future and past operators and a qu...
Domenico Bianculli, Paola Spoletini, Angelo Morzen...
JMLR
2008
127views more  JMLR 2008»
13 years 7 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King
TMI
2002
248views more  TMI 2002»
13 years 7 months ago
Adaptive Elastic Segmentation of Brain MRI via Shape Model Guided Evolutionary Programming
This paper presents a fully automated segmentation method for medical images. The goal is to localize and parameterize a variety of types of structure in these images for subsequen...
Alain Pitiot, Arthur W. Toga, Paul M. Thompson
SIGADA
1998
Springer
13 years 11 months ago
The Rendezvous is Dead - Long Live the Protected Object
This paper outlines the short-comings of rendezvous and the advantages of protected objects as a means of synchronization in Ada 95. A common Ada benchmark suite, ACES, gives the ...
Dragan Macos, Frank Mueller