Sciweavers

348 search results - page 62 / 70
» Automatic Syntactic Analysis for Detection of Word Combinati...
Sort
View
ICFP
1997
ACM
13 years 11 months ago
Implementing Bit-addressing with Specialization
General media-processing programs are easily expressed with bitaddressing and variable-sized bit-fields. But the natural implementation of bit-addressing relies on dynamic shift ...
Scott Draves
BIODATAMINING
2008
163views more  BIODATAMINING 2008»
13 years 7 months ago
Multivariate profiling of neurodegeneration-associated changes in a subcellular compartment of neurons via image processing
Background: Dysfunction in the endolysosome, a late endosomal to lysosomal degradative intracellular compartment, is an early hallmark of some neurodegenerative diseases, in parti...
Saravana K. Kumarasamy, Yunshi Wang, Vignesh Viswa...
BIBE
2006
IEEE
112views Bioinformatics» more  BIBE 2006»
14 years 1 months ago
Finding Correlations in Functionally Equivalent Proteins by Integrating Automated and Visual Data Exploration
The analysis of alignments of functionally equivalent proteins can reveal regularities such as correlated positions or residue patterns which are important to ensure a specific f...
Daniel A. Keim, Daniela Oelke, Royal Truman, Klaus...
DAC
2008
ACM
14 years 8 months ago
Partial order reduction for scalable testing of systemC TLM designs
A SystemC simulation kernel consists of a deterministic implementation of the scheduler, whose specification is nondeterministic. To leverage testing of a SystemC TLM design, we f...
Sudipta Kundu, Malay K. Ganai, Rajesh Gupta
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...