Sciweavers

2357 search results - page 332 / 472
» Computing Refactorings of Behavior Models
Sort
View
242
Voted
CP
2009
Springer
16 years 3 months ago
An Interpolation Method for CLP Traversal
We consider the problem of exploring the search tree of a CLP goal in pursuit of a target property. Essential to such a process is a method of tabling to prevent duplicate explorat...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
108
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
On Optimal Physical Carrier Sensing: Theoretical Analysis and Protocol Design
— Traditional Physical Carrier Sensing (PCS), which aims at eliminating hidden terminals in wireless networks, causes too many exposed terminals and deteriorates the throughput p...
Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu
LAWEB
2007
IEEE
15 years 9 months ago
Designing the Interface of Rich Internet Applications
In this paper we present a novel approach for designing the interface of rich internet applications. Our approach uses ract Data Views (ADV) design model allowing expressing in a ...
Matias Urbieta, Gustavo Rossi, Jeronimo Ginzburg, ...
AB
2007
Springer
15 years 9 months ago
Relating Attractors and Singular Steady States in the Logical Analysis of Bioregulatory Networks
Abstract. In 1973 R. Thomas introduced a logical approach to modeling and analysis of bioregulatory networks. Given a set of Boolean functions describing the regulatory interaction...
Heike Siebert, Alexander Bockmayr
FSEN
2007
Springer
15 years 9 months ago
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata
Abstract. A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due...
Mahdi Niamanesh, Rasool Jalili