Sciweavers

216 search results - page 39 / 44
» Reusing Domains for the Construction of Reverse Engineering ...
Sort
View
84
Voted
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
MAGS
2006
150views more  MAGS 2006»
14 years 9 months ago
The Agent-Rule-Class framework for Multi-Agent Systems
Multi-Agent Systems (MAS) have become increasingly mature, but this maturity does not make the traditional Object Oriented (OO) approaches obsolete. On the contrary, building MAS i...
Liang Xiao 0002, Des Greer
BMCBI
2008
116views more  BMCBI 2008»
14 years 9 months ago
The combination approach of SVM and ECOC for powerful identification and classification of transcription factor
Background: Transcription factors (TFs) are core functional proteins which play important roles in gene expression control, and they are key factors for gene regulation network co...
Guangyong Zheng, Ziliang Qian, Qing Yang, Chaochun...
ISSTA
2009
ACM
15 years 4 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
92
Voted
BMCBI
2007
187views more  BMCBI 2007»
14 years 9 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...