Sciweavers

757 search results - page 150 / 152
» Composing Security-Aware Software
Sort
View
BMCBI
2007
120views more  BMCBI 2007»
13 years 9 months ago
Transcript-based redefinition of grouped oligonucleotide probe sets using AceView: High-resolution annotation for microarrays
Background: Extracting biological information from high-density Affymetrix arrays is a multi-step process that begins with the accurate annotation of microarray probes. Shortfalls...
Jun Lu, Joseph C. Lee, Marc L. Salit, Margaret C. ...
MMS
2008
13 years 9 months ago
Canonical processes for creating personalized semantically rich multimedia presentations
Authoring of multimedia content can be considered as composing media assets such as images, videos, text, and audio in time, space, and interaction into a coherent multimedia pres...
Ansgar Scherp
FMSD
2007
110views more  FMSD 2007»
13 years 9 months ago
Exploiting interleaving semantics in symbolic state-space generation
Symbolic techniques based on Binary Decision Diagrams (BDDs) are widely employed for reasoning about temporal properties of hardware circuits and synchronous controllers. However, ...
Gianfranco Ciardo, Gerald Lüttgen, Andrew S. ...
JFR
2007
150views more  JFR 2007»
13 years 9 months ago
Decisional autonomy of planetary rovers
To achieve the ever increasing demand for science return, planetary exploration rovers require more autonomy to successfully perform their missions. Indeed, the communication dela...
Félix Ingrand, Simon Lacroix, Solange Lemai...
AI
2002
Springer
13 years 9 months ago
Using similarity criteria to make issue trade-offs in automated negotiations
Automated negotiation is a key form of interaction in systems that are composed of multiple autonomous agents. The aim of such interactions is to reach agreements through an itera...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...