Sciweavers

1226 search results - page 208 / 246
» Proofs, Programs and Abstract Complexity
Sort
View
CCR
2004
151views more  CCR 2004»
14 years 11 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
COMPUTING
2011
14 years 6 months ago
Cloud computing for small research groups in computational science and engineering: current status and outlook
Abstract Cloud computing could offer good business models for small CSE (Computational Science and Engineering) research groups because these groups often do not have enough human ...
Hong Linh Truong, Schahram Dustdar
CVIU
2011
14 years 3 months ago
A comparative study of object-level spatial context techniques for semantic image analysis
Abstract—In this paper, three approaches to utilizing objectlevel spatial contextual information for semantic image analysis are presented and comparatively evaluated. Contextual...
Georgios Th. Papadopoulos, Carsten Saathoff, Hugo ...
GCB
2009
Springer
180views Biometrics» more  GCB 2009»
15 years 6 months ago
2D Projections of RNA Folding Landscapes
Abstract: The analysis of RNA folding landscapes yields insights into the kinetic folding behavior not available from classical structure prediction methods. This is especially imp...
Ronny Lorenz, Christoph Flamm, Ivo L. Hofacker
CEC
2008
IEEE
15 years 6 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith