Sciweavers

605 search results - page 106 / 121
» A strategy for efficiently verifying requirements
Sort
View
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
14 years 9 months ago
DiMaC: a system for cleaning disguised missing data
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
SIGGRAPH
1992
ACM
14 years 1 months ago
Interactive inspection of solids: cross-sections and interferences
To reduce the cost of correcting design errors, assemblies of mechanical parts are modeled using CAD systems and verified electronically before the designs are sent to manufacturi...
Jarek Rossignac, Abe Megahed, Bengt-Olaf Schneider
CCS
2008
ACM
13 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
BMCBI
2010
157views more  BMCBI 2010»
13 years 9 months ago
SeqTrim: a high-throughput pipeline for pre-processing any type of sequence read
Background: High-throughput automated sequencing has enabled an exponential growth rate of sequencing data. This requires increasing sequence quality and reliability in order to a...
Juan Falgueras, Antonio J. Lara, Noé Fern&a...
BMCBI
2007
119views more  BMCBI 2007»
13 years 9 months ago
Conceptual-level workflow modeling of scientific experiments using NMR as a case study
Background: Scientific workflows improve the process of scientific experiments by making computations explicit, underscoring data flow, and emphasizing the participation of humans...
Kacy K. Verdi, Heidi J. C. Ellis, Michael R. Gryk