Sciweavers

30240 search results - page 6047 / 6048
» Robust System Design
Sort
View
GI
2003
Springer
14 years 3 months ago
IT-Sicherheit durch konsequente Aggregation von Analysewerkzeugen
: Bis heute wird die Sicherheit bei der Entwicklung von IT-Systemen eher stiefmütterlich behandelt. Die Hauptursache hierfür liegt in extrem kurzen Innovationszyklen: Unternehmen...
Thomas Schwenkler, Stephan Groß, Kai Simon
DSD
2002
IEEE
96views Hardware» more  DSD 2002»
14 years 2 months ago
Networks on Silicon: Blessing or Nightmare?
Continuing VLSI technology scaling raises several deep submicron (DSM) problems like relatively slow interconnect, power dissipation and distribution, and signal integrity. Those ...
Paul Wielage, Kees G. W. Goossens
AAAI
2008
14 years 3 days ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
IJCAI
1989
13 years 11 months ago
A Theorem Prover for Prioritized Circumscription
In a recent paper, Ginsberg shows how a backward-chaining ATMS can be used to construct a theorem prover for circumscription. Here, this work is extended to handle prioritized cir...
Andrew B. Baker, Matthew L. Ginsberg
BMCBI
2010
90views more  BMCBI 2010»
13 years 10 months ago
PuTmiR: A database for extracting neighboring transcription factors of human microRNAs
Background: Some of the recent investigations in systems biology have revealed the existence of a complex regulatory network between genes, microRNAs (miRNAs) and transcription fa...
Sanghamitra Bandyopadhyay, Malay Bhattacharyya
« Prev « First page 6047 / 6048 Last » Next »