Sciweavers

248 search results - page 47 / 50
» Phantom types and subtyping
Sort
View
ESOP
2001
Springer
14 years 1 days ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
MFPS
1989
13 years 11 months ago
Operations on Records
We define a simple collection of operations for creating and manipulating record structures, where records are intended as finite associations of values to labels. A second-order ...
Luca Cardelli, John C. Mitchell
BMCBI
2008
142views more  BMCBI 2008»
13 years 7 months ago
Genetic weighted k-means algorithm for clustering large-scale gene expression data
Background: The traditional (unweighted) k-means is one of the most popular clustering methods for analyzing gene expression data. However, it suffers three major shortcomings. It...
Fang-Xiang Wu
BMCBI
2010
128views more  BMCBI 2010»
13 years 7 months ago
VIGOR, an annotation program for small viral genomes
Background: The decrease in cost for sequencing and improvement in technologies has made it easier and more common for the re-sequencing of large genomes as well as parallel seque...
Shiliang Wang, Jaideep P. Sundaram, David Spiro
BMCBI
2002
147views more  BMCBI 2002»
13 years 7 months ago
Expression profiling of human renal carcinomas with functional taxonomic analysis
Background: Molecular characterization has contributed to the understanding of the inception, progression, treatment and prognosis of cancer. Nucleic acid array-based technologies...
Michael A. Gieseg, Theresa Cody, Michael Z. Man, S...