Sciweavers

1091 search results - page 131 / 219
» A New Approach to Design an Interactive System for Molecular...
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
BMCBI
2010
115views more  BMCBI 2010»
13 years 9 months ago
Multiconstrained gene clustering based on generalized projections
Background: Gene clustering for annotating gene functions is one of the fundamental issues in bioinformatics. The best clustering solution is often regularized by multiple constra...
Jia Zeng, Shanfeng Zhu, Alan Wee-Chung Liew, Hong ...
BMCBI
2008
98views more  BMCBI 2008»
13 years 9 months ago
MTAP: The Motif Tool Assessment Platform
Background: In recent years, substantial effort has been applied to de novo regulatory motif discovery. At this time, more than 150 software tools exist to detect regulatory bindi...
Daniel Quest, Kathryn Dempsey, Mohammad Shafiullah...
CDC
2010
IEEE
130views Control Systems» more  CDC 2010»
13 years 3 months ago
Decomposability of global tasks for multi-agent systems
Abstract-- Multi-agent system is a rapidly developing research area with strong support from both civilian and military applications. One of the essential problems in multi-agent s...
Mohammad Karimadini, Hai Lin 0002
EMSOFT
2006
Springer
14 years 16 days ago
Real-time interfaces for composing real-time systems
Recently, a number of frameworks were proposed to extend interface theory to the domains of single-processor and distributed real-time systems. This paper unifies some of these ap...
Lothar Thiele, Ernesto Wandeler, Nikolay Stoimenov