Sciweavers

2763 search results - page 528 / 553
» The Dangerous 'All' in Specifications
Sort
View
CCR
2002
97views more  CCR 2002»
13 years 10 months ago
Multi-modal network protocols
Most network protocols are uni-modal: they employ a single set of algorithms that allows them to cope well only within a narrow range of operating conditions. This rigid design re...
Rajesh Krishna Balan, Aditya Akella, Srinivasan Se...
COGSCI
2002
126views more  COGSCI 2002»
13 years 10 months ago
Eye scanpaths during visual imagery reenact those of perception of the same visual scene
Eye movements during mental imagery are not epiphenomenal but assist the process of image generation. Commands to the eyes for each fixation are stored along with the visual repre...
Bruno Laeng, Dinu-Stefan Teodorescu
COMBINATORICS
2002
92views more  COMBINATORICS 2002»
13 years 10 months ago
Pattern Avoidance in Permutations: Linear and Cyclic Orders
: We generalize the notion of pattern avoidance to arbitrary functions on ordered sets, and consider specifically three scenarios for permutations: linear, cyclic and hybrid, the f...
Antoine Vella
BMCBI
2007
169views more  BMCBI 2007»
13 years 10 months ago
Transcription factor target prediction using multiple short expression time series from Arabidopsis thaliana
Background: The central role of transcription factors (TFs) in higher eukaryotes has led to much interest in deciphering transcriptional regulatory interactions. Even in the best ...
Henning Redestig, Daniel Weicht, Joachim Selbig, M...
ENTCS
2002
181views more  ENTCS 2002»
13 years 10 months ago
Alias verification for Fortran code optimization
Abstract: Alias analysis for Fortran is less complicated than for programming languages with pointers but many real Fortran programs violate the standard: a formal parameter or a c...
Thi Viet Nga Nguyen, François Irigoin