Sciweavers

819 search results - page 111 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
108
Voted
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IPMI
2005
Springer
15 years 6 months ago
PET Image Reconstruction: A Robust State Space Approach
Statistical iterative reconstruction algorithms have shown improved image quality over conventional nonstatistical methods in PET by using accurate system response models and measu...
Huafeng Liu, Yi Tian, Pengcheng Shi
159
Voted
BMCBI
2011
14 years 7 months ago
Accurate statistics for local sequence alignment with position-dependent scoring by rare-event sampling
Background: Molecular database search tools need statistical models to assess the significance for the resulting hits. In the classical approach one asks the question how probable...
Stefan Wolfsheimer, Inke Herms, Sven Rahmann, Alex...
DNA
2003
Springer
15 years 5 months ago
One Dimensional Boundaries for DNA Tile Self-Assembly
In this paper we report the design and synthesis of DNA molecules (referred to as DNA tiles) with specific binding interactions that guide self-assembly to make one-dimensional as...
Rebecca Schulman, Shaun Lee, Nick Papadakis, Erik ...
SAC
2006
ACM
15 years 6 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...