Sciweavers

1219 search results - page 230 / 244
» Verification of Equivalent-Results Methods
Sort
View
JOT
2008
153views more  JOT 2008»
13 years 9 months ago
I Resign: Resigning Jar Files with Initium
This paper describes how to resign Jar files. Jar files (Java archives) are used by technologies (like Java Web Start) to deploy applications that are run with increased privilege...
Douglas Lyon
TCBB
2008
137views more  TCBB 2008»
13 years 9 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
TSE
2008
107views more  TSE 2008»
13 years 9 months ago
Interface Grammars for Modular Software Model Checking
We propose an interface specification language based on grammars for modular software model checking. In our interface specification language, component interfaces are specified a...
Graham Hughes, Tevfik Bultan
MR
2010
120views Robotics» more  MR 2010»
13 years 8 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
COMPSAC
2010
IEEE
13 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...