Sciweavers

9425 search results - page 1793 / 1885
» Some Notes on Models and Modelling
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 7 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
MLCW
2005
Springer
15 years 7 months ago
Evaluating Predictive Uncertainty Challenge
This Chapter presents the PASCAL1 Evaluating Predictive Uncertainty Challenge, introduces the contributed Chapters by the participants who obtained outstanding results, and provide...
Joaquin Quiñonero Candela, Carl Edward Rasm...
OOPSLA
2005
Springer
15 years 7 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
135
Voted
OOPSLA
2005
Springer
15 years 7 months ago
Safe futures for Java
is a simple and elegant abstraction that allows concurrency to be expressed often through a relatively small rewrite of a sequential program. In the absence of side-effects, futur...
Adam Welc, Suresh Jagannathan, Antony L. Hosking
RECOMB
2005
Springer
15 years 7 months ago
An Interactive Map of Regulatory Networks of Pseudomonas aeruginosa Genome
For studying gene regulatory and protein signaling networks, we have developed an interactive map for the Pseudomonas aeruginosa genome. We first represent genes, proteins and the...
Weihui Wu, Yongling Song, Shouguang Jin, Su-Shing ...
« Prev « First page 1793 / 1885 Last » Next »