Sciweavers

8080 search results - page 1545 / 1616
» From Computer Networks to Agent Networks
Sort
View
139
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 5 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
CCS
2008
ACM
15 years 5 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
126
Voted
ESM
1998
15 years 4 months ago
On Hybrid Combination of Queueing and Simulation
This paper aims to and illustrate that simulation and queuing theory can and should go hand in hand for a variety of practical problems, both in daily-life and industry, which are...
Nico M. van Dijk
ISMB
1994
15 years 4 months ago
Stochastic Motif Extraction Using Hidden Markov Model
In this paper, westudy the application of an ttMM(hidden Markov model) to the problem of representing protein sequencesby a stochastic motif. Astochastic protein motif represents ...
Yukiko Fujiwara, Minoru Asogawa, Akihiko Konagaya
« Prev « First page 1545 / 1616 Last » Next »