Sciweavers

7576 search results - page 1380 / 1516
» UNIX as an Application Program
Sort
View
117
Voted
JSAC
2006
70views more  JSAC 2006»
15 years 5 months ago
Throughput-range tradeoff of wireless mesh backhaul networks
Wireless backhaul communication is expected to play a significant role in providing the necessary backhaul resources for future high-rate wireless networks. Mesh networking, in whi...
H. Viswanathan, S. Mukherjee
218
Voted
ENTCS
2007
171views more  ENTCS 2007»
15 years 5 months ago
A Certifying Code Generation Phase
Guaranteeing correctness of compilation is a vital precondition for correct software. Code generation can be one of the most error-prone tasks in a compiler. One way to achieve tr...
Jan Olaf Blech, Arnd Poetzsch-Heffter
132
Voted
JUCS
2006
104views more  JUCS 2006»
15 years 5 months ago
Introducing the ITP Tool: a Tutorial
: We present a tutorial of the ITP tool, a rewriting-based theorem prover that can be used to prove inductive properties of membership equational specifications. We also introduce ...
Manuel Clavel, Miguel Palomino, Adrián Ries...
171
Voted
NAR
2008
119views more  NAR 2008»
15 years 5 months ago
MALISAM: a database of structurally analogous motifs in proteins
MALISAM (manual alignments for structurally analogous motifs) represents the first database containing pairs of structural analogs and their alignments. To find reliable analogs, ...
Hua Cheng, Bong-Hyun Kim, Nick V. Grishin
162
Voted
KES
2006
Springer
15 years 5 months ago
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
Named entities (e.g., "Kofi Annan", "Coca-Cola", "Second World War") are ubiquitous in web pages and other types of document and often provide a simpl...
Felix Weigel, Klaus U. Schulz, Levin Brunner, Edua...
« Prev « First page 1380 / 1516 Last » Next »