Sciweavers

525 search results - page 50 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
JCSS
2008
159views more  JCSS 2008»
13 years 9 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
ICDCS
2006
IEEE
14 years 3 months ago
Distributed Computing for Efficient Hyperspectral Imaging Using Fully Heterogeneous Networks of Workstations
Hyperspectral imaging is a new technique which has become increasingly important in many remote sensing applications, including automatic target recognition for military and defen...
Antonio Plaza, Javier Plaza, David Valencia
BMCBI
2008
119views more  BMCBI 2008»
13 years 9 months ago
A new method for 2D gel spot alignment: application to the analysis of large sample sets in clinical proteomics
Background: In current comparative proteomics studies, the large number of images generated by 2D gels is currently compared using spot matching algorithms. Unfortunately, differe...
Sabine Pérès, Laurence Molina, Nicol...
POPL
2010
ACM
14 years 6 months ago
Continuity Analysis of Programs
We present an analysis to automatically determine if a program represents a continuous function, or equivalently, if infinitesimal changes to its inputs can only cause infinitesim...
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerm...
LREC
2008
107views Education» more  LREC 2008»
13 years 10 months ago
An Experimental Methodology for an End-to-End Evaluation in Speech-to-Speech Translation
This paper describes the evaluation methodology used to evaluate the TC-STAR speech-to-speech translation (SST) system and their results from the third year of the project. It fol...
Olivier Hamon, Djamel Mostefa