Sciweavers

216 search results - page 19 / 44
» Modeling and Automated Containment of Worms
Sort
View
BMCBI
2010
233views more  BMCBI 2010»
13 years 7 months ago
Odefy -- From discrete to continuous models
Background: Phenomenological information about regulatory interactions is frequently available and can be readily converted to Boolean models. Fully quantitative models, on the ot...
Jan Krumsiek, Sebastian Pölsterl, Dominik M. ...
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
14 years 1 months ago
MobCon: A Generative Middleware Framework for Java Mobile Applications
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Vasian Cepa, Mira Mezini
ECMDAFA
2008
Springer
110views Hardware» more  ECMDAFA 2008»
13 years 9 months ago
Testing Metamodels
Abstract. In this paper, we deal with errors in metamodels. Metamodels define the abstract syntax of modeling languages. They play a central role in the Model-Driven Architecture. ...
Daniel A. Sadilek, Stephan Weißleder
CIBCB
2006
IEEE
14 years 1 months ago
A Novel Graphical Model Approach to Segmenting Cell Images
— Successful biological image analysis usually requires satisfactory segmentations to identify regions of interest as an intermediate step. Here we present a novel graphical mode...
Shann-Ching Chen, Ting Zhao, Geoffrey J. Gordon, R...
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson