Sciweavers

846 search results - page 147 / 170
» The Use of Z
Sort
View
FORMATS
2006
Springer
13 years 11 months ago
Extended Directed Search for Probabilistic Timed Reachability
Current numerical model checkers for stochastic systems can efficiently analyse stochastic models. However, the fact that they are unable to provide debugging information constrain...
Husain Aljazzar, Stefan Leue
CASES
2008
ACM
13 years 9 months ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar
AAAI
1990
13 years 9 months ago
AI and Software Engineering: Will the Twain Ever Meet?
This session will explore the reasons for the lack of impact in four important areas in which AI has been expected to significantly affect real world Software Engineering. The pan...
Robert Balzer
JMLR
2006
132views more  JMLR 2006»
13 years 7 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
PRESENCE
2007
121views more  PRESENCE 2007»
13 years 7 months ago
The Body Surface as a Communication System: The State of the Art after 50 Years
The suggestion that the body surface might be used as an additional means of presenting information to human-machine operators has been around in the literature for nearly 50 year...
Alberto Gallace, Hong Z. Tan, Charles Spence