Sciweavers

862 search results - page 172 / 173
» A Framework for Testing Peer-to-Peer Systems
Sort
View
COMPUTING
2008
174views more  COMPUTING 2008»
13 years 5 months ago
Multilevel algorithms for Rannacher-Turek finite element approximation of 3D elliptic problems
Generalizing the approach of a previous work [15] the authors present multilevel preconditioners for three-dimensional (3D) elliptic problems discretized by a family of Rannacher ...
Ivan Georgiev, Johannes Kraus, Svetozar Margenov
CORR
2008
Springer
147views Education» more  CORR 2008»
13 years 5 months ago
Automatic Contour Extraction from 2D Neuron Images
This work describes a novel methodology for automatic contour extraction from 2D images of 3D neurons (e.g. camera lucida images and other types of 2D microscopy). Most contour-ba...
Jorge J. G. Leandro, Roberto M. Cesar, Luciano da ...
BMCBI
2005
89views more  BMCBI 2005»
13 years 5 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
JAR
2000
145views more  JAR 2000»
13 years 5 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
OOPSLA
2010
Springer
13 years 4 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...