Sciweavers

4731 search results - page 862 / 947
» Securing Interactive Programs
Sort
View
JUCS
2008
117views more  JUCS 2008»
14 years 9 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
ENTCS
2007
115views more  ENTCS 2007»
14 years 9 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
KES
2006
Springer
14 years 9 months ago
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
Named entities (e.g., "Kofi Annan", "Coca-Cola", "Second World War") are ubiquitous in web pages and other types of document and often provide a simpl...
Felix Weigel, Klaus U. Schulz, Levin Brunner, Edua...
NAR
2006
134views more  NAR 2006»
14 years 9 months ago
The MPI Bioinformatics Toolkit for protein sequence analysis
The MPI Bioinformatics Toolkit is an interactive web service which offers access to a great variety of public and in-house bioinformatics tools. They are grouped into different se...
Andreas Biegert, Christian Mayer, Michael Remmert,...
SIAMSC
2008
182views more  SIAMSC 2008»
14 years 9 months ago
A Distributed SDP Approach for Large-Scale Noisy Anchor-Free Graph Realization with Applications to Molecular Conformation
We propose a distributed algorithm for solving Euclidean metric realization problems arising from large 3D graphs, using only noisy distance information, and without any prior kno...
Pratik Biswas, Kim-Chuan Toh, Yinyu Ye