Sciweavers

605 search results - page 108 / 121
» A strategy for efficiently verifying requirements
Sort
View
ACSAC
2001
IEEE
14 years 19 days ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
BIOINFORMATICS
2008
172views more  BIOINFORMATICS 2008»
13 years 9 months ago
Fitting a geometric graph to a protein-protein interaction network
Motivation: Finding a good network null model for protein-protein interaction (PPI) networks is a fundamental issue. Such a model would provide insights into the interplay between...
Desmond J. Higham, Marija Rasajski, Natasa Przulj
COMCOM
2008
151views more  COMCOM 2008»
13 years 9 months ago
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links
With the unique features of spatial multiplexing and interference suppression, Multiple Input Multiple Output (MIMO) techniques have great potential in the improvement of network ...
Jun Wang, Peng Du, Weijia Jia, Liusheng Huang, Hua...
BMCBI
2007
162views more  BMCBI 2007»
13 years 9 months ago
Genome-wide identification of specific oligonucleotides using artificial neural network and computational genomic analysis
Background: Genome-wide identification of specific oligonucleotides (oligos) is a computationallyintensive task and is a requirement for designing microarray probes, primers, and ...
Chun-Chi Liu, Chin-Chung Lin, Ker-Chau Li, Wen-Shy...
DAC
2004
ACM
14 years 10 months ago
Heterogeneous MP-SoC: the solution to energy-efficient signal processing
To meet conflicting flexibility, performance and cost constraints of demanding signal processing applications, future designs in this domain will contain an increasing number of a...
Tim Kogel, Heinrich Meyr