Abstract. Motivated by considerations in XML theory and model checking, data strings have been introduced as an extension of finite alphabet strings which carry, at each position,...
We describe a method for processing large amounts of volumetric data collected from a Knife Edge Scanning Microscope (KESM). The neuronal data that we acquire consists of thin, br...
Bruce H. McCormick, David Mayerich, John Keyser, P...
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Short product cycles and rapidly changing requirements are increasingly forcing developers to use agile development strategies like extreme programming and test–driven developme...
Egon Teiniker, Stefan Mitterdorfer, Leif Morgan Jo...
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...