Sciweavers

211 search results - page 22 / 43
» Cis-regulatory module detection using constraint programming
Sort
View
ALP
1994
Springer
13 years 12 months ago
Compositional Analysis for Equational Horn Programs
Abstract. We introduce a compositional characterization of the operational semantics of equational Horn programs. Then we show that this semantics and the standard operational sema...
María Alpuente, Moreno Falaschi, Germ&aacut...
CVPR
2008
IEEE
14 years 9 months ago
Global pose estimation using non-tree models
We propose a novel global pose estimation method to detect body parts of articulated objects in images based on non-tree graph models. There are two kinds of edges defined in the ...
Hao Jiang, David R. Martin
CONCUR
2000
Springer
14 years 2 days ago
LP Deadlock Checking Using Partial Order Dependencies
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit su...
Victor Khomenko, Maciej Koutny
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
14 years 25 days ago
Integration, cooling and packaging issues for aerospace equipments
—Packaging becomes an important issue in aerospace equipments because of high integration and severe environmental constraints. In order to develop products which respond to the ...
Claude Sarno, C. Tantolin
SIGSOFT
2005
ACM
14 years 8 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken