Sciweavers

2018 search results - page 363 / 404
» Code Normal Forms
Sort
View
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 8 months ago
Multiuser broadcast erasure channel with feedback - capacity and algorithms
We consider the N-user broadcast erasure channel where feedback from the users is fed back to the transmitter in the form of ACK messages. We provide a generic outer bound to the ...
Marios Gatzianas, Leonidas Georgiadis, Leandros Ta...
ENTCS
2008
122views more  ENTCS 2008»
13 years 8 months ago
Concurrency in Biological Modeling: Behavior, Execution and Visualization
Modeling natural systems is a complicated task that involves the concurrent behavior of various processes, mechanisms and objects. Here, we describe an approach that we have been ...
David Harel, Yaki Setty, Sol Efroni, Naamah Swerdl...
ASE
2006
161views more  ASE 2006»
13 years 8 months ago
Automated Prototyping of User Interfaces Based on UML Scenarios
User interface (UI) prototyping and scenario engineering have become popular techniques. Yet, the transition from scenario to formal specifications and the generation of UI code is...
Mohammed Elkoutbi, Ismaïl Khriss, Rudolf K. K...
FUIN
2006
79views more  FUIN 2006»
13 years 8 months ago
Simple Gene Assembly Is Deterministic
We investigate in this paper a simple intramolecular model for gene assembly in ciliates. Unlike the general intramolecular model, the folds that a micronuclear chromosome may for...
Miika Langille, Ion Petre
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 8 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald