Sciweavers

248 search results - page 47 / 50
» Phantom types and subtyping
Sort
View
ESOP
2001
Springer
15 years 4 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
MFPS
1989
15 years 3 months ago
Operations on Records
We define a simple collection of operations for creating and manipulating record structures, where records are intended as finite associations of values to labels. A second-order ...
Luca Cardelli, John C. Mitchell
BMCBI
2008
142views more  BMCBI 2008»
14 years 12 months ago
Genetic weighted k-means algorithm for clustering large-scale gene expression data
Background: The traditional (unweighted) k-means is one of the most popular clustering methods for analyzing gene expression data. However, it suffers three major shortcomings. It...
Fang-Xiang Wu
BMCBI
2010
128views more  BMCBI 2010»
14 years 12 months ago
VIGOR, an annotation program for small viral genomes
Background: The decrease in cost for sequencing and improvement in technologies has made it easier and more common for the re-sequencing of large genomes as well as parallel seque...
Shiliang Wang, Jaideep P. Sundaram, David Spiro
BMCBI
2002
147views more  BMCBI 2002»
14 years 11 months ago
Expression profiling of human renal carcinomas with functional taxonomic analysis
Background: Molecular characterization has contributed to the understanding of the inception, progression, treatment and prognosis of cancer. Nucleic acid array-based technologies...
Michael A. Gieseg, Theresa Cody, Michael Z. Man, S...