Sciweavers

1529 search results - page 168 / 306
» Energy-Based Models of P Systems
Sort
View
TACAS
2005
Springer
115views Algorithms» more  TACAS 2005»
15 years 3 months ago
On-the-Fly Reachability and Cycle Detection for Recursive State Machines
Searching the state space of a system using enumerative and on-the-fly depth-first traversal is an established technique for model checking finite-state systems. In this paper, ...
Rajeev Alur, Swarat Chaudhuri, Kousha Etessami, P....
IPPS
2002
IEEE
15 years 2 months ago
A Performance Optimization Framework for Compilation of Tensor Contraction Expressions into Parallel Programs
This paper discusses a program synthesis system to facilitate the generation of high-performance parallel programs for a class of computations encountered in quantum chemistry and...
Gerald Baumgartner, David E. Bernholdt, Daniel Coc...
FUIN
2008
72views more  FUIN 2008»
14 years 10 months ago
Working with the Past: Integrating History in Petri Nets
Abstract. Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 3 months ago
EA Planning, Development and Management Process for Agile Enterprise Development
In this study, we suggest an enterprise architecture (EA) development process model suitable for EA projects limited in scope and time. Several EA process models have been put for...
Mirja Pulkkinen, Ari P. Hirvonen
RAID
2005
Springer
15 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...