Sciweavers

5457 search results - page 1061 / 1092
» Software Component Independence
Sort
View
JCC
2011
154views more  JCC 2011»
14 years 3 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
SIAMIS
2011
14 years 3 months ago
On the Illumination Invariance of the Level Lines under Directed Light: Application to Change Detection
We analyze the illumination invariance of the level lines of an image. We show that if the scene surface has Lambertian reflectance and the light is directed, then a necessary and...
Pierre Weiss, Alexandre Fournier, Laure Blanc-F&ea...
CADE
2011
Springer
14 years 13 days ago
Experimenting with Deduction Modulo
Deduction modulo is a generic framework to describe proofs in a theory better than using raw axioms. This is done by presenting the theory through rules rewriting terms and proposi...
Guillaume Burel
POPL
2012
ACM
13 years 8 months ago
Resource-sensitive synchronization inference by abduction
We present an analysis which takes as its input a sequential program, augmented with annotations indicating potential parallelization opportunities, and a sequential proof, writte...
Matko Botincan, Mike Dodds, Suresh Jagannathan
122
Voted
ISCA
2012
IEEE
302views Hardware» more  ISCA 2012»
13 years 2 months ago
Scale-out processors
The emergence of global-scale online services has galvanized scale-out software, characterized by splitting vast datasets and massive computation across many independent servers. ...
Pejman Lotfi-Kamran, Boris Grot, Michael Ferdman, ...
« Prev « First page 1061 / 1092 Last » Next »