Sciweavers

6960 search results - page 1132 / 1392
» Continuity Analysis of Programs
Sort
View
101
Voted
CORR
2007
Springer
68views Education» more  CORR 2007»
15 years 3 months ago
An Improved Tight Closure Algorithm for Integer Octagonal Constraints
Integer octagonal constraints (a.k.a. Unit Two Variables Per Inequality or UTVPI integer constraints) constitute an interesting class of constraints for the representation and solu...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 3 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
TASE
2008
IEEE
15 years 3 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
BMCBI
2005
70views more  BMCBI 2005»
15 years 3 months ago
Integrating alternative splicing detection into gene prediction
Background: Alternative splicing (AS) is now considered as a major actor in transcriptome/ proteome diversity and it cannot be neglected in the annotation process of a new genome....
Sylvain Foissac, Thomas Schiex
131
Voted
JDS
2007
104views more  JDS 2007»
15 years 3 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
« Prev « First page 1132 / 1392 Last » Next »