Sciweavers

648 search results - page 24 / 130
» Software requirements validation via task analysis
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
BMCBI
2010
115views more  BMCBI 2010»
13 years 10 months ago
CONAN: copy number variation analysis software for genome-wide association studies
Background: Genome-wide association studies (GWAS) based on single nucleotide polymorphisms (SNPs) revolutionized our perception of the genetic regulation of complex traits and di...
Lukas Forer, Sebastian Schönherr, Hansi Wei&s...
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 10 months ago
Finite-SNR Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
Abstract--Diversity-multiplexing tradeoff (DMT) was characterized asymptotically (SNR-> infinity) for i.i.d. Rayleigh fading channel by Zheng and Tse [1]. The SNR-asymptotic DMT...
Sergey Loyka, George Levin
ALIFE
2006
13 years 10 months ago
Axiomatic Scalable Neurocontroller Analysis via the Shapley Value
One of the major challenges in the field of neurally driven evolved autonomous agents is deciphering the neural mechanisms underlying their behavior. Aiming at this goal, we have d...
Alon Keinan, Ben Sandbank, Claus C. Hilgetag, Isaa...
ICCAD
2005
IEEE
90views Hardware» more  ICCAD 2005»
14 years 6 months ago
Scalable compositional minimization via static analysis
State-equivalence based reduction techniques, e.g. bisimulation minimization, can be used to reduce a state transition system to facilitate subsequent verification tasks. However...
Fadi A. Zaraket, Jason Baumgartner, Adnan Aziz