Sciweavers

1949 search results - page 352 / 390
» Protective Interface Specifications
Sort
View
TOG
2002
122views more  TOG 2002»
13 years 9 months ago
Feature-based light field morphing
We present a feature-based technique for morphing 3D objects represented by light fields. Our technique enables morphing of imagebased objects whose geometry and surface propertie...
Zhunping Zhang, Lifeng Wang, Baining Guo, Heung-Ye...
NAR
2007
115views more  NAR 2007»
13 years 9 months ago
PReMod: a database of genome-wide mammalian cis-regulatory module predictions
We describe PReMod, a new database of genomewide cis-regulatory module (CRM) predictions for both the human and the mouse genomes. The prediction algorithm, described previously i...
Vincent Ferretti, Christian Poitras, Dominique Ber...
OPODIS
2010
13 years 7 months ago
On the Automated Implementation of Time-Based Paxos Using the IOA Compiler
Paxos is a well known algorithm for achieving consensus in distributed environments with uncertain processing and communication timing. Implementations of its variants have been s...
Chryssis Georgiou, Procopis Hadjiprocopiou, Peter ...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 7 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
BMCBI
2011
13 years 1 months ago
RAG: An Update to the RNA-As-Graphs Resource
Background: In 2004, we presented a web resource for stimulating the search for novel RNAs, RNA-As-Graphs (RAG), which classified, catalogued, and predicted RNA secondary structur...
Joseph A. Izzo, Namhee Kim, Shereef Elmetwaly, Tam...