Sciweavers

288 search results - page 46 / 58
» Compositional Machine Transliteration
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 9 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
BMCBI
2011
14 years 3 months ago
Determinants of Antigenicity and Specificity in immune response for Protein Sequences
Background: Target specific antibodies are pivotal for the design of vaccines, immunodiagnostic tests, studies on proteomics for cancer biomarker discovery, identification of prot...
Yulong Wang, Wenjun Wu, Nicolas N. Negre, Kevin P....
VEE
2005
ACM
119views Virtualization» more  VEE 2005»
15 years 5 months ago
A programmable microkernel for real-time systems
We present a new software system architecture for the implementation of hard real-time applications. The core of the system is a microkernel whose reactivity (interrupt handling a...
Christoph M. Kirsch, Marco A. A. Sanvido, Thomas A...
CP
2000
Springer
15 years 3 months ago
Expressiveness of Full First Order Constraints in the Algebra of Finite or Infinite Trees
We are interested in the expressiveness of constraints represented by general first order formulae, with equality as unique relation symbol and function symbols taken from an infi...
Alain Colmerauer, Thi-Bich-Hanh Dao
ASPLOS
2008
ACM
15 years 1 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...