Sciweavers

Share
155 search results - page 31 / 31
» A tool for design pattern detection and software architectur...
Sort
View
BMCBI
2007
99views more  BMCBI 2007»
11 years 5 months ago
Statistical significance of cis-regulatory modules
Background: It is becoming increasingly important for researchers to be able to scan through large genomic regions for transcription factor binding sites or clusters of binding si...
Dustin E. Schones, Andrew D. Smith, Michael Q. Zha...
SIGSOFT
2007
ACM
12 years 6 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
CGO
2006
IEEE
11 years 11 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
UIST
2004
ACM
11 years 11 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
AAMAS
2004
Springer
11 years 5 months ago
Automated Assistants for Analyzing Team Behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. The complex interactions of ag...
Ranjit Nair, Milind Tambe, Stacy Marsella, Taylor ...
books