Sciweavers

365 search results - page 73 / 73
» Types for Safe Locking
Sort
View
BMCBI
2006
98views more  BMCBI 2006»
13 years 4 months ago
Quantitative comparison of EST libraries requires compensation for systematic biases in cDNA generation
Background: Publicly accessible EST libraries contain valuable information that can be utilized for studies of tissue-specific gene expression and processing of individual genes. ...
Donglin Liu, Joel H. Graber
AROBOTS
2005
115views more  AROBOTS 2005»
13 years 4 months ago
Obstacle Detection and Terrain Classification for Autonomous Off-Road Navigation
Autonomous navigation in cross-country environments presents many new challenges with respect to more traditional, urban environments. The lack of highly structured components in t...
Roberto Manduchi, Andres Castano, A. Talukder, Lar...
ISF
2010
273views more  ISF 2010»
13 years 2 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
JUCS
2010
152views more  JUCS 2010»
12 years 11 months ago
Compositional Semantics of Dataflow Networks with Query-Driven Communication of Exact Values
: We develop and study the concept of dataflow process networks as used for example by Kahn to suit exact computation over data types related to real numbers, such as continuous fu...
Michal Konecný, Amin Farjudian
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 11 days ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross