By exploiting an analogy with averaging procedures in fluid dynamics, we present a set of averaged template matching equations. These equations are analogs of the exact template m...
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Using a flexible representation of biological sequences, we have performed a comparative analysis of 1208 known tRNA sequences. We believe we our technique is a more sensitive met...
Data-driven web applications are usually structured in three tiers with different programming models at each tier. This division forces developers to manually partition applicatio...
Fan Yang 0002, Nitin Gupta 0003, Nicholas Gerner, ...
Modern database systems provide not only powerful data models but also complex query languages supporting powerful features such as the ability to create new database objects and ...