Sciweavers

1855 search results - page 352 / 371
» Composing model programs for analysis
Sort
View
CORR
2007
Springer
111views Education» more  CORR 2007»
13 years 8 months ago
A New Perspective on Multi-user Power Control Games in Interference Channels
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
Yi Su, Mihaela van der Schaar
ALGORITHMICA
1999
84views more  ALGORITHMICA 1999»
13 years 8 months ago
Computational Approaches to Drug Design
Abstract. The rational approach to pharmaceutical drug design begins with an investigation of the relationship between chemical structure and biological activity. Information gaine...
Paul W. Finn, Lydia E. Kavraki
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SIGSOFT
2010
ACM
13 years 6 months ago
Building scalable software systems in the multicore era
Software systems must face two challenges today: growing complexity and increasing parallelism in the underlying computational models. The problem of increased complexity is often...
Hridesh Rajan
ICOODB
2009
246views Database» more  ICOODB 2009»
13 years 6 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia