Sciweavers

1264 search results - page 235 / 253
» The framework approach for constraint satisfaction
Sort
View
KBSE
2007
IEEE
15 years 8 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
113
Voted
CASES
2004
ACM
15 years 7 months ago
Balancing design options with Sherpa
Application specific processors offer the potential of rapidly designed logic specifically constructed to meet the performance and area demands of the task at hand. Recently, t...
Timothy Sherwood, Mark Oskin, Brad Calder
CF
2004
ACM
15 years 7 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
BMCBI
2006
87views more  BMCBI 2006»
15 years 1 months ago
Phylogeny based discovery of regulatory elements
Background: Algorithms that locate evolutionarily conserved sequences have become powerful tools for finding functional DNA elements, including transcription factor binding sites;...
Jason Gertz, Justin C. Fay, Barak A. Cohen
TCSV
2010
14 years 8 months ago
Application-Centric Routing for Video Streaming Over MultiHop Wireless Networks
Abstract--Most existing works on routing for video transmission over multihop wireless networks only focus on how to satisfy the network-oriented quality-of-service (QoS), such as ...
Dalei Wu, Song Ci, Haohong Wang, Aggelos K. Katsag...