Sciweavers

21490 search results - page 3978 / 4298
» Business Process Modeling
Sort
View
JALC
2006
87views more  JALC 2006»
15 years 4 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JNW
2008
97views more  JNW 2008»
15 years 4 months ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
JCB
2006
126views more  JCB 2006»
15 years 4 months ago
Combinatorics of Saturated Secondary Structures of RNA
Following Zuker (1986), a saturated secondary structure for a given RNA sequence is a secondary structure such that no base pair can be added without violating the definition of s...
P. Clote
DC
2007
15 years 4 months ago
The overhead of consensus failure recovery
Abstract Many reliable distributed systems are consensusbased and typically operate under two modes: a fast normal mode in failure-free synchronous periods, and a slower recovery m...
Partha Dutta, Rachid Guerraoui, Idit Keidar
JCP
2006
106views more  JCP 2006»
15 years 4 months ago
On the Development of Knowledge Management Services for Collaborative Decision Making
Admitting that the quality of a decision depends on the quality of the knowledge used to make it, it is argued that the enhancement of the decision making efficiency and effectiven...
Christina E. Evangelou, Nikos I. Karacapilidis, Ma...
« Prev « First page 3978 / 4298 Last » Next »