Sciweavers

442 search results - page 73 / 89
» Validation methods for calibrating software effort models
Sort
View
LICS
2006
IEEE
14 years 2 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
BMCBI
2006
169views more  BMCBI 2006»
13 years 8 months ago
Machine learning techniques in disease forecasting: a case study on rice blast prediction
Background: Diverse modeling approaches viz. neural networks and multiple regression have been followed to date for disease prediction in plant populations. However, due to their ...
Rakesh Kaundal, Amar S. Kapoor, Gajendra P. S. Rag...
LCPC
2009
Springer
14 years 1 months ago
Using the Meeting Graph Framework to Minimise Kernel Loop Unrolling for Scheduled Loops
This paper improves our previous research effort [1] by providing an efficient method for kernel loop unrolling minimisation in the case of already scheduled loops, where circular...
Mounira Bachir, David Gregg, Sid Ahmed Ali Touati
IEEESP
2006
108views more  IEEESP 2006»
13 years 8 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
AES
2008
Springer
182views Cryptology» more  AES 2008»
13 years 8 months ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat