Sciweavers

1687 search results - page 70 / 338
» Which pointer analysis should I use
Sort
View
134
Voted
ECRA
2007
116views more  ECRA 2007»
15 years 3 months ago
Two-level workload characterization of online auctions
Online auctions are rapidly becoming one of the significant forms of electronic commerce for buying and selling goods and services. A good understanding of the workload of auctio...
Vasudeva Akula, Daniel A. Menascé
137
Voted
CSB
2002
IEEE
103views Bioinformatics» more  CSB 2002»
15 years 8 months ago
Protein-Based Analysis of Alternative Splicing in the Human Genome
Understanding the functional significance of alternative splicing and other mechanisms that generate RNA transcript diversity is an important challenge facing modern-day molecular...
Ann E. Loraine, Gregg A. Helt, Melissa S. Cline, M...
109
Voted
JUCS
2007
84views more  JUCS 2007»
15 years 3 months ago
Deriving Consensus for Hierarchical Incomplete Ordered Partitions and Coverings
: A method for determining consensus of hierarchical incomplete ordered partitions and coverings of sets is presented in this chapter. Incomplete ordered partitions and coverings a...
Marcin Hernes, Ngoc Thanh Nguyen
149
Voted
BMCBI
2006
132views more  BMCBI 2006»
15 years 3 months ago
Genome-wide DNA polymorphism analyses using VariScan
Background: DNA sequence polymorphisms analysis can provide valuable information on the evolutionary forces shaping nucleotide variation, and provides an insight into the function...
Stephan Hutter, Albert J. Vilella, Julio Rozas
126
Voted
DSN
2006
IEEE
15 years 9 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha