Sciweavers

1777 search results - page 269 / 356
» Programming Cryptographic Protocols
Sort
View
CN
2008
118views more  CN 2008»
13 years 9 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso
BMCBI
2005
92views more  BMCBI 2005»
13 years 8 months ago
A restraint molecular dynamics and simulated annealing approach for protein homology modeling utilizing mean angles
Background: We have developed the program PERMOL for semi-automated homology modeling of proteins. It is based on restrained molecular dynamics using a simulated annealing protoco...
Andreas Möglich, Daniel Weinfurtner, Till Mau...
PPDP
2005
Springer
14 years 2 months ago
ReactiveML: a reactive extension to ML
We present ReactiveML, a programming language dedicated to the implementation of complex reactive systems as found in graphical user interfaces, video games or simulation problems...
Louis Mandel, Marc Pouzet
BIRTHDAY
2003
Springer
14 years 2 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
PLDI
2010
ACM
14 years 1 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund