Sciweavers

1937 search results - page 322 / 388
» Starting B Specifications from Use Cases
Sort
View
ESEM
2008
ACM
15 years 6 months ago
Evaluation of capture-recapture models for estimating the abundance of naturally-occurring defects
Project managers can use capture-recapture models to manage the inspection process by estimating the number of defects present in an artifact and determining whether a reinspectio...
Gursimran Singh Walia, Jeffrey C. Carver
BMCBI
2011
14 years 8 months ago
Linear and non-linear dependencies between copy number aberrations and mRNA expression reveal distinct molecular pathways in Bre
Background: Elucidating the exact relationship between gene copy number and expression would enable identification of regulatory mechanisms of abnormal gene expression and biologi...
Hiroko K. Solvang, Ole Christian Lingjærde, ...
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 9 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 8 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
CASES
2007
ACM
15 years 8 months ago
SCCP/x: a compilation profile to support testing and verification of optimized code
Embedded systems are often used in safety-critical environments. Thus, thorough testing of them is mandatory. A quite active research area is the automatic test-case generation fo...
Raimund Kirner