Sciweavers

1781 search results - page 263 / 357
» Functional Answer Set Programming
Sort
View
BMCBI
2006
182views more  BMCBI 2006»
15 years 1 months ago
AceTree: a tool for visual analysis of Caenorhabditis elegans embryogenesis
Background: The invariant lineage of the nematode Caenorhabditis elegans has potential as a powerful tool for the description of mutant phenotypes and gene expression patterns. We...
Thomas J. Boyle, Zhirong Bao, John I. Murray, Carl...
96
Voted
TASE
2008
IEEE
15 years 1 months ago
On Clamping Planning in Workpiece-Fixture Systems
Deformation at contacts between the workpiece and locators/clamps resulting from large contact forces causes overall workpiece displacement, and affects the localization accuracy o...
Caihua Xiong, Michael Yu Wang, You-Lun Xiong
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 8 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
SAC
2010
ACM
15 years 8 months ago
Implementing software product lines using traits
A software product line (SPL) is a set of software systems with well-defined commonalities and variabilities that are developed by managed reuse of common artifacts. In this pape...
Lorenzo Bettini, Ferruccio Damiani, Ina Schaefer
CCS
2007
ACM
15 years 7 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth