Sciweavers

3555 search results - page 618 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
BMCBI
2007
140views more  BMCBI 2007»
15 years 1 months ago
Accurate prediction of protein secondary structure and solvent accessibility by consensus combiners of sequence and structure in
Background: Structural properties of proteins such as secondary structure and solvent accessibility contribute to three-dimensional structure prediction, not only in the ab initio...
Gianluca Pollastri, Alberto J. M. Martin, Catherin...
TIT
2008
83views more  TIT 2008»
15 years 1 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck
CASES
2009
ACM
15 years 8 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks
EMSOFT
2008
Springer
15 years 3 months ago
Quantitative testing
We investigate the problem of specification based testing with dense sets of inputs and outputs, in particular with imprecision as they might occur due to errors in measurements, ...
Henrik C. Bohnenkamp, Mariëlle Stoelinga
HICSS
2002
IEEE
143views Biometrics» more  HICSS 2002»
15 years 6 months ago
Business Intelligence in Healthcare Organizations
The management of healthcare organizations starts to recognize the relevance of the definition of care products in relation to management information. In the turmoil between costs...
Ton A. M. Spil, Robert A. Stegwee, Christian J. A....