Sciweavers

15 search results - page 2 / 3
» Simple Circuits that Work for Complicated Reasons
Sort
View
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
13 years 6 months ago
Structure and parameter estimation for cell systems biology models
In this work we present a new methodology for structure and parameter estimation in cell systems biology modelling. Our modelling framework is based on P systems, an unconl comput...
Francisco José Romero-Campero, Hongqing Cao...
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 5 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
ESA
2004
Springer
92views Algorithms» more  ESA 2004»
13 years 11 months ago
Finding Dominators in Practice
The computation of dominators in a flowgraph has applications in several areas, including program optimization, circuit testing, and theoretical biology. Lengauer and Tarjan [30]...
Loukas Georgiadis, Renato Fonseca F. Werneck, Robe...
CSB
2005
IEEE
129views Bioinformatics» more  CSB 2005»
13 years 11 months ago
Minimal Marker Sets to Discriminate Among Seedlines
Raising seeds for biological experiments is prone to error; a careful experimenter will test in the lab to verify that plants are of the intended strain. Choosing a minimal set of...
Thomas C. Hudson, Ann E. Stapleton, Amy M. Curley
FSTTCS
2003
Springer
13 years 11 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh