Sciweavers

620 search results - page 89 / 124
» Towards a Model for the Multidimensional Analysis of Field D...
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
BMCBI
2010
167views more  BMCBI 2010»
13 years 7 months ago
BisoGenet: a new tool for gene network building, visualization and analysis
Background: The increasing availability and diversity of omics data in the post-genomic era offers new perspectives in most areas of biomedical research. Graph-based biological ne...
Alexander Martin, Maria Elena Ochagavia, Laya C. R...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
ICIP
2008
IEEE
14 years 9 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
PEPM
2009
ACM
14 years 4 months ago
Guided model checking for programs with polymorphism
Exhaustive model checking search techniques are ineffective for error discovery in large and complex multi-threaded software systems. Distance estimate heuristics guide the concre...
Neha Rungta, Eric G. Mercer