Sciweavers

4897 search results - page 979 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
BMCBI
2007
136views more  BMCBI 2007»
13 years 5 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
MCS
2006
Springer
13 years 5 months ago
A phase-field method for interface-tracking simulation of two-phase flows
For interface-tracking simulation of two-phase flows, we propose a new computational method, NS-PFM, combining Navier-Stokes (NS) equations with phase-field model (PFM). Based on ...
Naoki Takada, Masaki Misawa, Akio Tomiyama
IIE
2007
125views more  IIE 2007»
13 years 5 months ago
Should LOGO Keep Going FORWARD 1?
LOGO has been evolving in incremental steps for 40 years. This has resulted in steady progress but some regions of the space of all programming languages for children cannot be re...
Ken Kahn
JAR
2000
145views more  JAR 2000»
13 years 5 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
LOGCOM
1998
178views more  LOGCOM 1998»
13 years 5 months ago
Applying the Mu-Calculus in Planning and Reasoning about Action
Planning algorithms have traditionally been geared toward achievement goals in single-agent environments. Such algorithms essentially produce plans to reach one of a specified se...
Munindar P. Singh