Sciweavers

628 search results - page 112 / 126
» Effectively Open Real Functions
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
14 years 11 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
BMCBI
2005
118views more  BMCBI 2005»
14 years 11 months ago
Vestige: Maximum likelihood phylogenetic footprinting
Background: Phylogenetic footprinting is the identification of functional regions of DNA by their evolutionary conservation. This is achieved by comparing orthologous regions from...
Matthew J. Wakefield, Peter Maxwell, Gavin A. Hutt...
ISCI
2002
112views more  ISCI 2002»
14 years 11 months ago
Intelligent learning and control of autonomous robotic agents operating in unstructured environments
The control of autonomous intelligent robotic agent operating in unstructured changing environments includes many objective difficulties. One major difficulty concerns the charact...
Hani Hagras, Tarek M. Sobh
VLDB
1998
ACM
170views Database» more  VLDB 1998»
14 years 11 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...
BWCCA
2010
14 years 6 months ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...