Sciweavers

102291 search results - page 20177 / 20459
» Computing
Sort
View
125
Voted
JSA
2008
108views more  JSA 2008»
15 years 2 months ago
A methodology to design arbitrary failure detectors for distributed protocols
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process crash represents only a particular faulty behavior. Handling tougher failures (...
Roberto Baldoni, Jean-Michel Hélary, Sara T...
139
Voted
JCC
2006
110views more  JCC 2006»
15 years 2 months ago
Using internal and collective variables in Monte Carlo simulations of nucleic acid structures: Chain breakage/closure algorithm
: This article describes a method for solving the geometric closure problem for simplified models of nucleic acid structures by using the constant bond lengths approximation. The r...
Heinz Sklenar, Daniel Wüstner, Remo Rohs
145
Voted
JSAC
2008
140views more  JSAC 2008»
15 years 2 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
222
Voted
DEBU
2007
111views more  DEBU 2007»
15 years 2 months ago
Multi-lingual Semantic Matching with OrdPath in Relational Systems
The volume of information in natural languages in electronic format is increasing exponentially. The demographics of users of information management systems are becoming increasin...
A. Kumaran, Peter Carlin
130
Voted
JUCS
2008
115views more  JUCS 2008»
15 years 2 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
« Prev « First page 20177 / 20459 Last » Next »