Sciweavers

3830 search results - page 602 / 766
» From Reference Model to Component Model
Sort
View
FLOPS
2006
Springer
15 years 6 months ago
Contracts as Pairs of Projections
Abstract. Assertion-based contracts provide a powerful mechanism for stating invariants at module boundaries and for enforcing them uniformly. In 2002, Findler and Felleisen showed...
Robert Bruce Findler, Matthias Blume
SSR
2001
104views more  SSR 2001»
15 years 4 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
BMCBI
2010
191views more  BMCBI 2010»
15 years 3 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
15 years 1 months ago
Rao-Blackwellized particle filtering for probing-based 6-DOF localization in robotic assembly
This paper presents a probing-based method for probabilistic localization in automated robotic assembly. We consider peg-in-hole problems in which a needle-like peg has a single p...
Yuichi Taguchi, Tim K. Marks, Haruhisa Okuda
JAIR
2010
181views more  JAIR 2010»
14 years 10 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton