Sciweavers

1265 search results - page 91 / 253
» Finding the Key to a Synapse
Sort
View
AUTOMATICA
2006
88views more  AUTOMATICA 2006»
13 years 9 months ago
Exact computation of amplification for a class of nonlinear systems arising from cellular signaling pathways
A commonly employed measure of the signal amplification properties of an input/output system is its induced L2 norm, sometimes also known as H gain. In general, however, it is ext...
Eduardo D. Sontag, Madalena Chaves
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 9 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
ENTCS
2006
142views more  ENTCS 2006»
13 years 9 months ago
The Rewriting Logic Semantics Project
Rewriting logic is a flexible and expressive logical framework that unifies algebraic denotational semantics and structural operational semantics (SOS) in a novel way, avoiding th...
José Meseguer, Grigore Rosu
IJCBDD
2008
113views more  IJCBDD 2008»
13 years 9 months ago
Parsimony accelerated Maximum Likelihood searches
: Phylogenetic search is a key tool used in a variety of biological research endeavors. However, this search problem is known to be computationally difficult, due to the astronomic...
Kenneth Sundberg, Timothy O'Connor, Hyrum Carroll,...
IJAR
2006
92views more  IJAR 2006»
13 years 9 months ago
Possibilistic clustering approach to trackless ring Pattern Recognition in RICH counters
The pattern recognition problem in Ring Imaging CHerenkov (RICH) counters concerns the identification of an unknown number of rings whose centers and radii are assumed to be unkno...
A. M. Massone, Léonard Studer, Francesco Ma...