Sciweavers

4762 search results - page 635 / 953
» About the use of protein models
Sort
View
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 2 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...
113
Voted
IEPOL
2006
67views more  IEPOL 2006»
15 years 1 months ago
Platform competition and broadband uptake: Theory and empirical evidence from the European union
Broadband access provides users with high speed, always-on connectivity to the Internet. Due to its superiority, broadband is seen as the way for consumers and firms to exploit th...
Walter Distaso, Paolo Lupi, Fabio M. Manenti
128
Voted
COMPUTER
2000
128views more  COMPUTER 2000»
15 years 1 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
ENTCS
2000
112views more  ENTCS 2000»
15 years 1 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
IJCV
1998
101views more  IJCV 1998»
15 years 1 months ago
Synthesis of Novel Views from a Single Face Image
Images formed by a human face change with viewpoint. A new technique is described for synthesizing images of faces from new viewpoints, when only a single 2D image is available. A...
Thomas Vetter