Sciweavers

232 search results - page 41 / 47
» Asynchronous programming, analysis and testing with state ma...
Sort
View
68
Voted
BMCBI
2006
158views more  BMCBI 2006»
14 years 9 months ago
Detection of non-coding RNAs on the basis of predicted secondary structure formation free energy change
Background: Non-coding RNAs (ncRNAs) have a multitude of roles in the cell, many of which remain to be discovered. However, it is difficult to detect novel ncRNAs in biochemical s...
Andrew V. Uzilov, Joshua M. Keegan, David H. Mathe...
CCS
2004
ACM
15 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
POPL
2007
ACM
15 years 10 months ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 4 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Efficient Recognition of Authentic Dynamic Facial Expressions on the Feedtum Database
In order to allow for fast recognition of a user’s affective state we discuss innovative holistic and self organizing approaches for efficient facial expression analysis. The f...
Frank Wallhoff, Björn Schuller, Michael Hawel...