Sciweavers

832 search results - page 110 / 167
» Characteristic Patterns for LTL
Sort
View
SG
2009
Springer
15 years 11 months ago
A Rendering Method for 3D Origami Models Using Face Overlapping Relations
When we construct a model of origami (a model of a folded sheet of paper) in a computer, it is usual to represent the model as a set of polygons having zero thickness. One of the t...
Yohsuke Furuta, Jun Mitani, Yukio Fukui
SPIN
2009
Springer
15 years 11 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
TPCTC
2009
Springer
106views Hardware» more  TPCTC 2009»
15 years 11 months ago
Measuring Database Performance in Online Services: A Trace-Based Approach
Many large-scale online services use structured storage to persist metadata and sometimes data. The structured storage is typically provided by standard database servers such as Mi...
Swaroop Kavalanekar, Dushyanth Narayanan, Sriram S...
HT
2009
ACM
15 years 11 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
ISLPED
2009
ACM
188views Hardware» more  ISLPED 2009»
15 years 11 months ago
Transaction-based adaptive dynamic voltage scaling for interactive applications
In an interactive embedded system, special task execution patterns and scheduling constraints exist due to frequent human-computer interactions. This paper proposes a transaction-...
Xia Zhao, Yao Guo, Xiangqun Chen