Sciweavers

1539 search results - page 242 / 308
» Is it time for real-time functional programming
Sort
View
193
Voted
APBC
2004
173views Bioinformatics» more  APBC 2004»
15 years 5 months ago
RNA Secondary Structure Prediction with Simple Pseudoknots
Pseudoknots are widely occurring structural motifs in RNA. Pseudoknots have been shown to be functionally important in different RNAs which play regulatory, catalytic, or structur...
Jitender S. Deogun, Ruben Donts, Olga Komina, Fang...
142
Voted
ECLIPSE
2006
ACM
15 years 9 months ago
HAM: cross-cutting concerns in Eclipse
As programs evolve, newly added functionality sometimes no longer aligns with the original design, ending up scattered across the software system. Aspect mining tries to identify ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
158
Voted
BMCBI
2006
182views more  BMCBI 2006»
15 years 3 months ago
AceTree: a tool for visual analysis of Caenorhabditis elegans embryogenesis
Background: The invariant lineage of the nematode Caenorhabditis elegans has potential as a powerful tool for the description of mutant phenotypes and gene expression patterns. We...
Thomas J. Boyle, Zhirong Bao, John I. Murray, Carl...
WABI
2005
Springer
120views Bioinformatics» more  WABI 2005»
15 years 9 months ago
Multiple Structural RNA Alignment with Lagrangian Relaxation
In contrast to proteins, many classes of functionally related RNA molecules show a rather weak sequence conservation but instead a fairly well conserved secondary structure. Hence ...
Markus Bauer, Gunnar W. Klau, Knut Reinert
122
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 10 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...