Sciweavers

389 search results - page 15 / 78
» Information Flow in the Peer-Reviewing Process
Sort
View
ICCAD
1994
IEEE
122views Hardware» more  ICCAD 1994»
15 years 1 months ago
An enhanced flow model for constraint handling in hierarchical multi-view design environments
In this paper we present an enhanced design flow model that increases the capabilities of a CAD framework to support design activities on hierarchical multi-view design descriptio...
Pieter van der Wolf, K. Olav ten Bosch, Alfred van...
75
Voted
WSC
2007
14 years 12 months ago
Communication and process simulation of set-based design for concrete reinforcement
Two discrete-event simulations are developed to assess the feasibility of improving the delivery process of reinforced concrete structures. The simulations represent the resource ...
John-Michael Wong, Kristen Parrish, Iris D. Tommel...
BMCBI
2005
94views more  BMCBI 2005»
14 years 9 months ago
T.I.M.S: TaqMan Information Management System, tools to organize data flow in a genotyping laboratory
Background: Single Nucleotide Polymorphism (SNP) genotyping is a major activity in biomedical research. The Taqman technology is one of the most commonly used approaches. It produ...
Stéphanie Monnier, David G. Cox, Tim Albion...
CADE
2005
Springer
15 years 10 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...