Sciweavers

570 search results - page 112 / 114
» Robustness and Implementability of Timed Automata
Sort
View
BMCBI
2008
79views more  BMCBI 2008»
14 years 11 months ago
A high-throughput pipeline for designing microarray-based pathogen diagnostic assays
Background: We present a methodology for high-throughput design of oligonucleotide fingerprints for microarray-based pathogen diagnostic assays. The oligonucleotide fingerprints, ...
Ravi Vijaya Satya, Nela Zavaljevski, Kamal Kumar, ...
CL
2010
Springer
14 years 11 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
FUIN
2008
119views more  FUIN 2008»
14 years 11 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
TSMC
2008
147views more  TSMC 2008»
14 years 11 months ago
Tracking of Multiple Targets Using Online Learning for Reference Model Adaptation
Recently, much work has been done in multiple ob-4 ject tracking on the one hand and on reference model adaptation5 for a single-object tracker on the other side. In this paper, we...
Franz Pernkopf
JSAC
2007
128views more  JSAC 2007»
14 years 11 months ago
Understanding the Power of Pull-Based Streaming Protocol: Can We Do Better?
— Most of the real deployed peer-to-peer streaming systems adopt pull-based streaming protocol. In this paper, we demonstrate that, besides simplicity and robustness, with proper...
Meng Zhang, Qian Zhang, Lifeng Sun, Shiqiang Yang