Sciweavers

396 search results - page 19 / 80
» The missing Wendland functions
Sort
View
ICDCS
2005
IEEE
14 years 2 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
COLT
1989
Springer
14 years 20 days ago
Learning in the Presence of Inaccurate Information
The present paper considers the effects of introducing inaccuracies in a learner’s environment in Gold’s learning model of identification in the limit. Three kinds of inaccu...
Mark A. Fulk, Sanjay Jain
ISIM
2007
13 years 10 months ago
Formal Computation Independent Model of the Problem Domain within the MDA
The proposed approach called Topological Functioning Modeling for Model Driven Architecture (TFMfMDA) uses formal mathematical foundations of Topological Functioning Model. It intr...
Janis Osis, Erika Asnina, Andrejs Grave
BMCBI
2010
131views more  BMCBI 2010»
13 years 8 months ago
FACT: Functional annotation transfer between proteins with similar feature architectures
Background: The increasing number of sequenced genomes provides the basis for exploring the genetic and functional diversity within the tree of life. Only a tiny fraction of the e...
Tina Koestler, Arndt von Haeseler, Ingo Ebersberge...
BMCBI
2006
127views more  BMCBI 2006»
13 years 8 months ago
Automatic discovery of cross-family sequence features associated with protein function
Background: Methods for predicting protein function directly from amino acid sequences are useful tools in the study of uncharacterised protein families and in comparative genomic...
Markus Brameier, Josien Haan, Andrea Krings, Rober...