Sciweavers

1192 search results - page 145 / 239
» Computing Weakest Readings
Sort
View
115
Voted
CAD
2006
Springer
15 years 3 months ago
Parametric interpolation using sampled data
, and of course, you have the option to download any article straight to your desktop, depending on your access rights. Read more about how the TOP 25 is generated and what it refl...
Soon Yong Jeong, Yun Jong Choi, PooGyeon Park
132
Voted
IJAOSE
2007
82views more  IJAOSE 2007»
15 years 3 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi
144
Voted
CAD
1999
Springer
15 years 3 months ago
Set-combinations of the mixed-dimension cellular objects of the Djinn API
This paper is concerned with the mathematics and formal specification of "set-like" operations for the mixed dimension cellular objects of the Djinn Application Programm...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes
139
Voted
PERCOM
2007
ACM
15 years 3 months ago
GSM indoor localization
Accurate indoor localization has long been an objective of the ubiquitous computing research community, and numerous indoor localization solutions based on 802.11, Bluetooth, ultra...
Alex Varshavsky, Eyal de Lara, Jeffrey Hightower, ...
139
Voted
IPPS
2010
IEEE
15 years 1 months ago
Consistency in hindsight: A fully decentralized STM algorithm
Abstract--Software transactional memory (STM) algorithms often rely on centralized components to achieve atomicity, isolation and consistency. In a distributed setting, centralized...
Annette Bieniusa, Thomas Fuhrmann