Sciweavers

3330 search results - page 208 / 666
» software 2010
Sort
View
RE
2010
Springer
13 years 5 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
CISIS
2010
IEEE
14 years 5 months ago
Logic-Based Steady-State Analysis and Revision of Metabolic Networks with Inhibition
—This paper presents a qualitative logic-based method for the steady-state analysis and revision of metabolic networks with inhibition. The approach is able to automatically revi...
Oliver Ray, Ken E. Whelan, Ross D. King
CISIS
2010
IEEE
14 years 5 months ago
A Multidimensional Array Slicing DSL for Stream Programming
—Stream languages offer a simple multi-core programming model and achieve good performance. Yet expressing data rearrangement patterns (like a matrix block decomposition) in thes...
Pablo de Oliveira Castro, Stéphane Louise, ...
CISIS
2010
IEEE
14 years 5 months ago
Gene Ontology Rewritten for Computing Gene Functional Similarity
Abstract—Discovery biological organisation of the cell in modules network is a challenging task. Currently, approaches based on a controlled vocabulary, as Gene Ontology, to iden...
Alessia Visconti, Francesca Cordero, Marco Botta, ...
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 9 months ago
Precisely Analyzing Loss in Interface Adapter Chains
Interface adaptation allows code written for one interface to be used with a software component with another interface. When multiple adapters are chained together to make certain...
Yoo Chung