Sciweavers

3134 search results - page 503 / 627
» Computing full disjunctions
Sort
View
SAC
2010
ACM
13 years 10 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
SIGCOMM
2010
ACM
13 years 10 months ago
How internet concepts and technologies can help green and smarten the electrical grid
Several powerful forces are gathering to make fundamental and irrevocable changes to the century-old grid. The nextgeneration grid, often called the `smart grid,' will featur...
Srinivasan Keshav, Catherine Rosenberg
CVPR
2007
IEEE
13 years 10 months ago
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...
Ankur Chattopadhyay, Terrance E. Boult
BMCBI
2010
112views more  BMCBI 2010»
13 years 10 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner
BMCBI
2007
195views more  BMCBI 2007»
13 years 10 months ago
NeuroTerrain - a client-server system for browsing 3D biomedical image data sets
Background: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full us...
Carl Gustafson, William J. Bug, Jonathan Nissanov