Sciweavers

211 search results - page 22 / 43
» Cis-regulatory module detection using constraint programming
Sort
View
ALP
1994
Springer
15 years 1 months ago
Compositional Analysis for Equational Horn Programs
Abstract. We introduce a compositional characterization of the operational semantics of equational Horn programs. Then we show that this semantics and the standard operational sema...
María Alpuente, Moreno Falaschi, Germ&aacut...
CVPR
2008
IEEE
15 years 11 months ago
Global pose estimation using non-tree models
We propose a novel global pose estimation method to detect body parts of articulated objects in images based on non-tree graph models. There are two kinds of edges defined in the ...
Hao Jiang, David R. Martin
CONCUR
2000
Springer
15 years 1 months ago
LP Deadlock Checking Using Partial Order Dependencies
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit su...
Victor Khomenko, Maciej Koutny
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
15 years 2 months ago
Integration, cooling and packaging issues for aerospace equipments
—Packaging becomes an important issue in aerospace equipments because of high integration and severe environmental constraints. In order to develop products which respond to the ...
Claude Sarno, C. Tantolin
SIGSOFT
2005
ACM
15 years 10 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken