Sciweavers

124 search results - page 23 / 25
» Inverse Procedural Modeling by Automatic Generation of L-sys...
Sort
View
BMCBI
2005
125views more  BMCBI 2005»
13 years 7 months ago
A simple approach for protein name identification: prospects and limits
Background: Significant parts of biological knowledge are available only as unstructured text in articles of biomedical journals. By automatically identifying gene and gene produc...
Katrin Fundel, Daniel Güttler, Ralf Zimmer, J...
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 7 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 1 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
ITC
2003
IEEE
139views Hardware» more  ITC 2003»
14 years 19 days ago
Fault Pattern Oriented Defect Diagnosis for Memories
Failure analysis (FA) and diagnosis of memory cores plays a key role in system-on-chip (SOC) product development and yield ramp-up. Conventional FA based on bitmaps and the experi...
Chih-Wea Wang, Kuo-Liang Cheng, Jih-Nung Lee, Yung...
DAGSTUHL
2010
13 years 8 months ago
Pre-operative Planning and Intra-operative Guidance for Shoulder Replacement Surgery
Shoulder joint replacement, or arthroplasty, is indicated in cases where arthritis or trauma has resulted in severe joint damage that in turn causes increased pain and decreased f...
Charl P. Botha, Peter R. Krekel, Edward R. Valstar...