Sciweavers

2421 search results - page 326 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2008
119views more  BMCBI 2008»
15 years 4 months ago
On deducing causality in metabolic networks
Background: Metabolic networks present a complex interconnected structure, whose understanding is in general a non-trivial task. Several formal approaches have been developed to s...
Chiara Bodei, Andrea Bracciali, Davide Chiarugi
ACSD
2010
IEEE
219views Hardware» more  ACSD 2010»
15 years 2 months ago
The Model Checking View to Clock Gating and Operand Isolation
Abstract--Clock gating and operand isolation are two techniques to reduce the power consumption in state-of-the-art hardware designs. Both approaches basically follow a two-step pr...
Jens Brandt, Klaus Schneider, Sumit Ahuja, Sandeep...
INTERNET
2002
175views more  INTERNET 2002»
15 years 4 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
DAC
2007
ACM
16 years 5 months ago
PV-PPV: Parameter Variability Aware, Automatically Extracted, Nonlinear Time-Shifted Oscillator Macromodels
Abstract-- The PPV is a robust phase domain macromodel for oscillators. It has been proven to predict oscillators' responses correctly under small signal perturbations, and ca...
Zhichun Wang, Xiaolue Lai, Jaijeet S. Roychowdhury
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
16 years 4 months ago
Provenance management in curated databases
Curated databases in bioinformatics and other disciplines are the result of a great deal of manual annotation, correction and transfer of data from other sources. Provenance infor...
Peter Buneman, Adriane Chapman, James Cheney