Sciweavers

1798 search results - page 111 / 360
» Generating presentation constraints from rhetorical structur...
Sort
View
HICSS
2002
IEEE
71views Biometrics» more  HICSS 2002»
15 years 4 months ago
Source Code Generator Based on a Proprietary Specification Language
An application generator has resulted from the authors' efforts to improve the development of interactive database applications. The developed tool is based on a meta-base. T...
Kresimir Fertalj, Damir Kalpic, Vedran Mornar
BMCBI
2008
149views more  BMCBI 2008»
14 years 11 months ago
Clustering of cognate proteins among distinct proteomes derived from multiple links to a single seed sequence
Background: Modern proteomes evolved by modification of pre-existing ones. It is extremely important to comparative biology that related proteins be identified as members of the s...
Adriano Barbosa-Silva, Venkata P. Satagopam, Reinh...
SAC
2002
ACM
14 years 11 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
ECAI
1998
Springer
15 years 3 months ago
Diagnosis of Active Systems
Abstract: Lazy computation is not new in model-based diagnosis of active systems (and of discreteevent systems in general). Up to a decade ago, diagnosis methods for discrete-event...
Pietro Baroni, Gianfranco Lamperti, Paolo Pogliano...
ICASSP
2008
IEEE
15 years 5 months ago
Forensic techniques for classifying scanner, computer generated and digital camera images
Digital images can be captured or generated by a variety of sources including digital cameras, scanners and computer graphics softwares. In many cases it is important to be able t...
Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, ...