Sciweavers

747 search results - page 140 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
14 years 2 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
AMAI
1999
Springer
13 years 8 months ago
Logic Programs with Stable Model Semantics as a Constraint Programming Paradigm
Logic programming with the stable model semantics is put forward as a novel constraint programming paradigm. This paradigm is interesting because it bring advantages of logic prog...
Ilkka Niemelä
CASES
2006
ACM
14 years 2 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
BMCBI
2006
147views more  BMCBI 2006»
13 years 8 months ago
A case study in pathway knowledgebase verification
Background: Biological databases and pathway knowledgebases are proliferating rapidly. We are developing software tools for computer-aided hypothesis design and evaluation, and we...
Stephen A. Racunas, Nigam Shah, Nina V. Fedoroff
BMCBI
2004
102views more  BMCBI 2004»
13 years 8 months ago
FRAGS: estimation of coding sequence substitution rates from fragmentary data
Background: Rates of substitution in protein-coding sequences can provide important insights into evolutionary processes that are of biomedical and theoretical interest. Increased...
Estienne C. Swart, Winston A. Hide, Cathal Seoighe