Sciweavers

661 search results - page 91 / 133
» What Can We Expect from Program Verification
Sort
View
SIGSOFT
2002
ACM
14 years 8 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
ECOOP
2006
Springer
13 years 11 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
JMLR
2012
11 years 10 months ago
A metric learning perspective of SVM: on the relation of LMNN and SVM
Support Vector Machines, SVMs, and the Large Margin Nearest Neighbor algorithm, LMNN, are two very popular learning algorithms with quite different learning biases. In this paper...
Huyen Do, Alexandros Kalousis, Jun Wang, Adam Wozn...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Decentralized Search with Random Costs
A decentralized search algorithm is a method of routing on a random graph that uses only limited, local, information about the realization of the graph. In some random graph model...
Oskar Sandberg
BMCBI
2010
138views more  BMCBI 2010»
13 years 7 months ago
Sigma-2: Multiple sequence alignment of non-coding DNA via an evolutionary model
Background: While most multiple sequence alignment programs expect that all or most of their input is known to be homologous, and penalise insertions and deletions, this is not a ...
Gayathri Jayaraman, Rahul Siddharthan