Sciweavers

109 search results - page 2 / 22
» Chain of Responsibility
Sort
View
BMCBI
2007
104views more  BMCBI 2007»
13 years 6 months ago
A response to Yu et al. "A forward-backward fragment assembling algorithm for the identification of genomic amplification and de
Background: Yu et al. (BMC Bioinformatics 2007,8: 145+) have recently compared the performance of several methods for the detection of genomic amplification and deletion breakpoin...
Oscar M. Rueda, Ramón Díaz-Uriarte
ECWEB
2010
Springer
195views ECommerce» more  ECWEB 2010»
13 years 4 months ago
Bilateral Negotiation in a Multi-agent Supply Chain System
A supply chain is a set of organizations directly linked by flows of services from suppliers to customers. Supply chain activities range from the ordering and receipt of raw materi...
Fernando Lopes, Helder Coelho
VTS
2000
IEEE
99views Hardware» more  VTS 2000»
13 years 10 months ago
Virtual Scan Chains: A Means for Reducing Scan Length in Cores
A novel design-for-test (DFT) technique is presented for designing a core with a “virtual scan chain” which looks (to the system integrator) like it is shorter than the real s...
Abhijit Jas, Bahram Pouya, Nur A. Touba
CAV
2007
Springer
113views Hardware» more  CAV 2007»
14 years 13 days ago
On Synthesizing Controllers from Bounded-Response Properties
In this paper we propose a complete chain for synthesizing controllers from high-level specifications. From real-time properties expressed in the logic MTL we generate, under boun...
Oded Maler, Dejan Nickovic, Amir Pnueli
RAID
2001
Springer
13 years 10 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...