Sciweavers

2875 search results - page 553 / 575
» Model checking agentspeak
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
COOTS
1997
13 years 9 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
CEC
2010
IEEE
13 years 8 months ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...
BMCBI
2007
174views more  BMCBI 2007»
13 years 7 months ago
Inferring activity changes of transcription factors by binding association with sorted expression profiles
Background: The identification of transcription factors (TFs) associated with a biological process is fundamental to understanding its regulatory mechanisms. From microarray data,...
Chao Cheng, Xiting Yan, Fengzhu Sun, Lei M. Li
BMCBI
2008
188views more  BMCBI 2008»
13 years 7 months ago
anNET: a tool for network-embedded thermodynamic analysis of quantitative metabolome data
Background: Compared to other omics techniques, quantitative metabolomics is still at its infancy. Complex sample preparation and analytical procedures render exact quantification...
Nicola Zamboni, Anne Kümmel, Matthias Heinema...