Sciweavers

1687 search results - page 99 / 338
» Which pointer analysis should I use
Sort
View
INFOCOM
2003
IEEE
15 years 9 months ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
BMCBI
2006
192views more  BMCBI 2006»
15 years 4 months ago
Analysis of circular genome rearrangement by fusions, fissions and block-interchanges
Background: Analysis of genomes evolving via block-interchange events leads to a combinatorial problem of sorting by block-interchanges, which has been studied recently to evaluat...
Chin Lung Lu, Yen-Lin Huang, Tsui Ching Wang, Hsie...
CDC
2009
IEEE
109views Control Systems» more  CDC 2009»
15 years 8 months ago
Geometry of cyclic pursuit
Abstract— Pursuit strategies (formulated using constantspeed particle models) provide a means for achieving cohesive behavior in systems of multiple mobile agents. In the present...
Kevin S. Galloway, Eric W. Justh, P. S. Krishnapra...
BMCBI
2010
136views more  BMCBI 2010»
15 years 4 months ago
Bias correction and Bayesian analysis of aggregate counts in SAGE libraries
Background: Tag-based techniques, such as SAGE, are commonly used to sample the mRNA pool of an organism's transcriptome. Incomplete digestion during the tag formation proces...
Russell L. Zaretzki, Michael A. Gilchrist, William...
IJDAR
2007
69views more  IJDAR 2007»
15 years 3 months ago
User-driven page layout analysis of historical printed books
In this paper, based on the study of the specificity of historical printed books, we first explain the main error sources in classical methods used for page layout analysis. We sho...
Jean-Yves Ramel, S. Leriche, M. L. Demonet, S. Bus...