Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Denis Bueno"'
Autor:
Camargo, Gabriela Loiola, de Souza, Renato Aparecido, da Silva, Dênis Bueno, Garcia, José Antônio Dias, Silveira, Landulfo, Jr
Publikováno v:
In Journal of Photochemistry & Photobiology, B: Biology August 2017 173:92-98
Autor:
Karem A. Sakallah, Denis Bueno
Publikováno v:
Electronic Proceedings in Theoretical Computer Science. 320:163-166
Autor:
Michelle Leger, Michael Darling, Stephen Jones, Laura Matzen, David Stracuzzi, Andrew Wilson, Denis Bueno, Matthew Christentsen, Melissa Ginaldi, David Hannasch, Scott Heidbrink, Breannan Howell, Chris Leger, Geoffrey Reedy, Alisa Rogers, Jack Williams
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2f147c6aa5a5ab88e8b5ca0a0a4ea834
https://doi.org/10.2172/1832314
https://doi.org/10.2172/1832314
Autor:
Karem A. Sakallah, Denis Bueno
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030112448
VMCAI
VMCAI
We introduce and evaluate an algorithm for an Open image in new window -style software model checker that operates entirely at the level of equality with uninterpreted functions (EUF). Our checker, called Open image in new window , targets control pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f962bb177266cf7588375e55fef6f8d3
https://doi.org/10.1007/978-3-030-11245-5_17
https://doi.org/10.1007/978-3-030-11245-5_17
Autor:
Karin M. Butler, Denis Bueno, Michelle Leger, Julian Tuminaro, Michael Joseph Haass, Geoffrey Reedy, Timothy Loffredo, Christopher Cuellar
Publikováno v:
Human Interface and the Management of Information. Visual Information and Knowledge Management ISBN: 9783030226596
HCI (4)
HCI (4)
Vulnerability analysts protecting software lack adequate tools for understanding data flow in binaries. We present a case study in which we used human factors methods to develop a taxonomy for understanding data flow and the visual representations ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2fb600dcfa8f297d761774d6c4b17d44
https://doi.org/10.1007/978-3-030-22660-2_12
https://doi.org/10.1007/978-3-030-22660-2_12
Autor:
Laura E. Matzen, Alessandro Orso, Ravi Mangal, Julian Tuminaro, Vivian Nguyen, Karin M. Butler, John Stasko, Geoffrey Reedy, Michael J. Haas, Andrew T. Wilson, Timothy Loffredo, Michelle Leger, Matthew Crepeau, Mallory C. Stites, Christopher Cuellar, Denis Bueno, Alex Godwin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef1b11e3a2882f3857c36f74f85838bd
https://doi.org/10.2172/1529591
https://doi.org/10.2172/1529591
Autor:
Michelle Leger, William M. Siever, Adam Harter, Marketa Illetskova, Alex R. Bertels, Samuel A. Mulder, Daniel R. Tauritz, Joshua M. Tuggle, Samuel N. Richter, Denis Bueno
Publikováno v:
SSCI
Many real-world engineering and science problems can be mapped to Boolean satisfiability problems (SAT). CDCL SAT solvers are among the most efficient solvers. Previous work showed that instances derived from a particular problem class exhibit a uniq
Autor:
Daniela Gomes Martins Bueno, Ana Carolina Corsi Pereira, Stefani A. M. dos Reis, Denis Bueno Silva, Wagner Zeferino de Freitas, Elisângela Silva
Publikováno v:
Medicine & Science in Sports & Exercise. 51:40-40
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783642412837
RAID
RAID
Many of the important decidability results in malware analysis are based Turing machine models of computation. We exhibit computational models which use more realistic assumptions about machine and attacker resources. While seminal results such as [1
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::516c760d6a98a4768f7141843a4fced9
https://doi.org/10.1007/978-3-642-41284-4_10
https://doi.org/10.1007/978-3-642-41284-4_10
Publikováno v:
IEEE International Conference on Electric Machines and Drives, 2005..
This work presents the development of a welding machine current MIG pulsed that it uses a mathematical model. Initially the control model is developed with theories and applications PID which should be adjusted in agreement with the operation points