Sciweavers

678 search results - page 100 / 136
» Dependent Types for Program Understanding
Sort
View
CORR
2012
Springer
230views Education» more  CORR 2012»
12 years 3 months ago
Fast Triangle Counting through Wedge Sampling
Graphs and networks are used to model interactions in a variety of contexts, and there is a growing need to be able to quickly assess the qualities of a graph in order to understa...
C. Seshadhri, Ali Pinar, Tamara G. Kolda
ISBI
2002
IEEE
14 years 8 months ago
Automated determination of protein subcellular locations from 3D fluorescence microscope images
Knowing the subcellular location of a protein is critical to a full understanding of its function, and automated, objective methods for assigning locations are needed as part of t...
Meel Velliste, Robert F. Murphy
CCS
2007
ACM
14 years 1 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICSE
2005
IEEE-ACM
14 years 1 months ago
Component-based software engineering for embedded systems
Although attractive, CBD has not been widely adopted in domains of embedded systems. The main reason is inability of these technologies to cope with the important concerns of embe...
Ivica Crnkovic
PUC
2010
121views more  PUC 2010»
13 years 6 months ago
Expressing and interpreting emotional movements in social games with robots
This paper provides a framework for recording, analyzing and modeling of 3 dimensional emotional movements for embodied game applications. To foster embodied interaction, we need i...
Emilia I. Barakova, Tino Lourens