Sciweavers

959 search results - page 175 / 192
» Transfers between Logics and their Applications
Sort
View
BMCBI
2010
109views more  BMCBI 2010»
15 years 2 months ago
FPGA acceleration of the phylogenetic likelihood function for Bayesian MCMC inference methods
Background: Likelihood (ML)-based phylogenetic inference has become a popular method for estimating the evolutionary relationships among species based on genomic sequence data. Th...
Stephanie Zierke, Jason D. Bakos
115
Voted
CORR
2008
Springer
179views Education» more  CORR 2008»
15 years 1 months ago
Practical Automated Partial Verification of Multi-Paradigm Real-Time Models
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...
Carlo A. Furia, Matteo Pradella, Matteo Rossi
TWC
2008
153views more  TWC 2008»
15 years 1 months ago
Improved Resource Management through User Aggregation in Heterogeneous Multiple Access Wireless Networks
Abstract--In this letter we discuss the exploitation of aggregated mobility patterns in mobile networks including heterogeneous multiple access techniques. We advocate the use of k...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
103
Voted
CGF
2004
118views more  CGF 2004»
15 years 1 months ago
Cultural Heritage Preservation Using Constructive Shape Modeling
Issues of digital preservation of shapes and internal structures of historical cultural objects are discussed. An overview of existing approaches to digital preservation related t...
Carl Vilbrandt, Galina Pasko, Alexander A. Pasko, ...
WCRE
2010
IEEE
15 years 6 days ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel