Sciweavers

661 search results - page 80 / 133
» What Can We Expect from Program Verification
Sort
View
POPL
1997
ACM
15 years 7 months ago
Shape Types
Type systems currently available for imperative languages are too weak to detect a significant class of programming errors. For example, they cannot express the property that a l...
Pascal Fradet, Daniel Le Métayer
116
Voted
DSN
2004
IEEE
15 years 6 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
RECOMB
2009
Springer
15 years 10 months ago
Yeast Ancestral Genome Reconstructions: The Possibilities of Computational Methods
In 2006, a debate has risen on the question of the efficiency of bioinformatics methods to reconstruct mammalian ancestral genomes. Three years later, Gordon et al. (PLoS Genetics,...
Eric Tannier
IJCV
2011
264views more  IJCV 2011»
14 years 10 months ago
Cost-Sensitive Active Visual Category Learning
Abstract We present an active learning framework that predicts the tradeoff between the effort and information gain associated with a candidate image annotation, thereby ranking un...
Sudheendra Vijayanarasimhan, Kristen Grauman
LCTRTS
2010
Springer
15 years 1 months ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla