Sciweavers

426 search results - page 77 / 86
» Specification, Abduction, and Proof
Sort
View
AI
2003
Springer
14 years 3 months ago
Negotiating Exchanges of Private Information for Web Service Eligibility
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Keping Jia, Bruce Spencer
EMSOFT
2007
Springer
14 years 1 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
AIPS
2009
13 years 11 months ago
A Semantics for HTN Methods
Despite the extensive development of first-principles planning in recent years, planning applications are still primarily developed using knowledge-based planners which can exploi...
Robert P. Goldman
BMCBI
2010
178views more  BMCBI 2010»
13 years 10 months ago
Applications of a formal approach to decipher discrete genetic networks
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
Fabien Corblin, Eric Fanchon, Laurent Trilling
BMCBI
2008
98views more  BMCBI 2008»
13 years 10 months ago
MTAP: The Motif Tool Assessment Platform
Background: In recent years, substantial effort has been applied to de novo regulatory motif discovery. At this time, more than 150 software tools exist to detect regulatory bindi...
Daniel Quest, Kathryn Dempsey, Mohammad Shafiullah...