Sciweavers

3909 search results - page 291 / 782
» Extreme Model Checking
Sort
View
109
Voted
FCT
2007
Springer
15 years 9 months ago
On Notions of Regularity for Data Languages
Abstract. Motivated by considerations in XML theory and model checking, data strings have been introduced as an extension of finite alphabet strings which carry, at each position,...
Henrik Björklund, Thomas Schwentick
123
Voted
VIS
2004
IEEE
145views Visualization» more  VIS 2004»
16 years 4 months ago
Compression, Segmentation, and Modeling of Large-Scale Filamentary Volumetric Data
We describe a method for processing large amounts of volumetric data collected from a Knife Edge Scanning Microscope (KESM). The neuronal data that we acquire consists of thin, br...
Bruce H. McCormick, David Mayerich, John Keyser, P...
151
Voted
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 10 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
155
Voted
COMPSAC
2003
IEEE
15 years 9 months ago
A Test-Driven Component Development Framework based on the CORBA Component Model
Short product cycles and rapidly changing requirements are increasingly forcing developers to use agile development strategies like extreme programming and test–driven developme...
Egon Teiniker, Stefan Mitterdorfer, Leif Morgan Jo...
149
Voted
MASCOTS
1993
15 years 4 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long