Sciweavers

1522 search results - page 245 / 305
» Practical Exception Specifications
Sort
View
BMCBI
2008
136views more  BMCBI 2008»
13 years 9 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
FAC
2006
122views more  FAC 2006»
13 years 9 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
ISF
2008
92views more  ISF 2008»
13 years 9 months ago
Information technology workforce skills: The software and IT services provider perspective
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...
Tim Goles, Stephen Hawk, Kate M. Kaiser
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 9 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
JSAC
2008
111views more  JSAC 2008»
13 years 9 months ago
The end-to-end rate control in multiple-hop wireless networks: Cross-layer formulation and optimal allocation
In this paper, we study the theoretical problem of the end-to-end rate assignment for multi-hop wireless networks. Specifically, we consider the problem of joint congestion control...
Chengnian Long, Bo Li, Qian Zhang, Bin Zhao, Bo Ya...