Sciweavers

114 search results - page 13 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
ISPW
2005
IEEE
14 years 1 months ago
Process Programming to Support Medical Safety: A Case Study on Blood Transfusion
Medical errors are now recognized as a major cause of untimely deaths or other adverse medical outcomes. To reduce the number of medical errors, the Medical Safety Project at the U...
Lori A. Clarke, Yao Chen, George S. Avrunin, Bin C...
IBERAMIA
2004
Springer
14 years 29 days ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
BMCBI
2007
97views more  BMCBI 2007»
13 years 7 months ago
A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, hu
Background: The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interp...
Rudi Alberts, Peter Terpstra, Menno Hardonk, Leoni...
DKE
2008
158views more  DKE 2008»
13 years 7 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
WWW
2004
ACM
14 years 8 months ago
Analysis of interacting BPEL web services
This paper presents a set of tools and techniques for analyzing interactions of composite web services which are specified in BPEL and communicate through asynchronous XML message...
Xiang Fu, Tevfik Bultan, Jianwen Su