Sciweavers

5843 search results - page 1167 / 1169
» Software Security in Practice
Sort
View
TCBB
2010
144views more  TCBB 2010»
13 years 29 days ago
Querying Graphs in Protein-Protein Interactions Networks Using Feedback Vertex Set
Recent techniques increase rapidly the amount of our knowledge on interactions between proteins. The interpretation of these new information depends on our ability to retrieve kno...
Guillaume Blin, Florian Sikora, Stéphane Vi...
TROB
2010
176views more  TROB 2010»
13 years 28 days ago
Modeling Deformations of General Parametric Shells Grasped by a Robot Hand
The robot hand applying force on a deformable object will result in a changing wrench space due to the varying shape and normal of the contact area. Design and analysis of a manipu...
Jiang Tian, Yan-Bin Jia
MANSCI
2011
12 years 9 months ago
Dynamic Price Competition with Fixed Capacities
Many revenue management (RM) industries are characterized by (a) fixed capacities in the short term (e.g., hotel rooms, seats on an airline flight), (b) homogeneous products (e....
Victor Martínez-de-Albéniz, Kalyan T...
POPL
2011
ACM
12 years 9 months ago
Decidable logics combining heap structures and data
We define a new logic, STRAND, that allows reasoning with heapmanipulating programs using deductive verification and SMT solvers. STRAND logic (“STRucture ANd Data” logic) f...
P. Madhusudan, Gennaro Parlato, Xiaokang Qiu
GIS
2010
ACM
13 years 4 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
« Prev « First page 1167 / 1169 Last » Next »