Sciweavers

1415 search results - page 243 / 283
» Verified systems by composition from verified components
Sort
View
TRUST
2010
Springer
14 years 23 days ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
BMCBI
2005
145views more  BMCBI 2005»
13 years 7 months ago
CAGER: classification analysis of gene expression regulation using multiple information sources
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...
Jianhua Ruan, Weixiong Zhang
HASE
2007
IEEE
13 years 9 months ago
Behavioral Fault Modeling for Model-based Safety Analysis
Recent work in the area of Model-based Safety Analysis has demonstrated key advantages of this methodology over traditional approaches, for example, the capability of automatic ge...
Anjali Joshi, Mats Per Erik Heimdahl
RTSS
1998
IEEE
13 years 12 months ago
Membership Questions for Timed and Hybrid Automata
Timed and hybrid automata are extensions of finite-state machines for formal modeling of embedded systems with both discrete and continuous components. Reachability problems for t...
Rajeev Alur, Robert P. Kurshan, Mahesh Viswanathan
ACL
1994
13 years 9 months ago
An Automatic Treebank Conversion Algorithm for Corpus Sharing
An automatic treebank conversion method is proposed in this paper to convert a treebank into another treebank. A new treebank associated with a different grammar can be generated ...
Jong-Nae Wang, Jing-Shin Chang, Keh-Yih Su