Sciweavers

177 search results - page 35 / 36
» Modeling Network Coded TCP Throughput: A Simple Model and it...
Sort
View
BMCBI
2010
138views more  BMCBI 2010»
13 years 5 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
SWAP
2008
13 years 6 months ago
Uniform Access to Domotic Environments through Semantics
This paper proposes a Domotic OSGi Gateway (DOG) able to expose different domotic networks as a single, technology neutral, home automation system. The adoption of a standard frame...
Dario Bonino, Emiliano Castellina, Fulvio Corno
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 5 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
TACAS
1998
Springer
81views Algorithms» more  TACAS 1998»
13 years 9 months ago
Formal Design and Analysis of a Gear Controller
In this paper, we report on an application of the validation and veri cation tool kit Uppaal in the design and analysis of a prototype gear controller, carried out in a joint proje...
Magnus Lindahl, Paul Pettersson, Wang Yi
CCIA
2007
Springer
13 years 11 months ago
Mendelian error detection in complex pedigrees using weighted constraint satisfaction techniques
With the arrival of high throughput genotyping techniques, the detection of likely genotyping errors is becoming an increasingly important problem. In this paper we are interested...
Martí Sánchez, Simon de Givry, Thoma...