Sciweavers

228 search results - page 40 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
CONCUR
2007
Springer
14 years 2 months ago
Rule-Based Modelling of Cellular Signalling
Abstract. Modelling is becoming a necessity in studying biological signalling pathways, because the combinatorial complexity of such systems rapidly overwhelms intuitive and qualit...
Vincent Danos, Jérôme Feret, Walter F...
BMCBI
2008
150views more  BMCBI 2008»
13 years 8 months ago
BibGlimpse: The case for a light-weight reprint manager in distributed literature research
Background: While text-mining and distributed annotation systems both aim at capturing knowledge and presenting it in a standardized form, there have been few attempts to investig...
Thomas Tüchler, Golda Velez, Alexandra Graf, ...
CHI
2010
ACM
14 years 3 months ago
Code bubbles: a working set-based interface for code understanding and maintenance
Developers spend significant time reading and navigating code fragments spread across multiple locations. The filebased nature of contemporary IDEs makes it prohibitively difficul...
Andrew Bragdon, Robert C. Zeleznik, Steven P. Reis...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 3 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
14 years 2 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...