Sciweavers

12551 search results - page 2504 / 2511
» Reuse in Systems Engineering
Sort
View
SAC
2010
ACM
13 years 7 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
DLS
2009
227views Languages» more  DLS 2009»
13 years 7 months ago
The ruby intermediate language
Ruby is a popular, dynamic scripting language that aims to "feel natural to programmers"and give users the"freedom to choose" among many different ways of doin...
Michael Furr, Jong-hoon (David) An, Jeffrey S. Fos...
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
13 years 7 months ago
The Flexible Climate Data Analysis Tools (CDAT) for Multi-model Climate Simulation Data
Being able to incorporate, inspect, and analyze data with newly developed technologies, diagnostics, and visualizations in an easy and flexible way has been a longstanding challen...
Dean N. Williams, Charles M. Doutriaux, Robert S. ...
BIB
2010
140views more  BIB 2010»
13 years 7 months ago
Next generation sequencing in functional genomics
Genome-wide sequencing has enabled modern biomedical research to relate more and more events in healthy as well as disease-affected cells and tissues to the genomic sequence. Now ...
Thomas Werner
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 2504 / 2511 Last » Next »