Sciweavers

11211 search results - page 2026 / 2243
» Rank-Sensitive Data Structures
Sort
View
125
Voted
CGI
2004
IEEE
15 years 7 months ago
Surface Models of Tube Trees
This paper describes a new method for generating surfaces of branching tubular structures with given centerlines and radii. As the centerlines are not straight lines, the cross-se...
Petr Felkel, Rainer Wegenkittl, Katja Bühler
COMPSAC
2004
IEEE
15 years 7 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
CPM
2004
Springer
107views Combinatorics» more  CPM 2004»
15 years 7 months ago
Sorting by Reversals in Subquadratic Time
The problem of sorting a signed permutation by reversals is inspired by genome rearrangements in computational molecular biology. Given two genomes represented as two signed permut...
Eric Tannier, Marie-France Sagot
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
15 years 7 months ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...
CSFW
2004
IEEE
15 years 7 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
« Prev « First page 2026 / 2243 Last » Next »