Sciweavers

4752 search results - page 833 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
187
Voted
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
16 years 2 months ago
Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys
The suitability of Peer-to-Peer (P2P) approaches for fulltext web retrieval has recently been questioned because of the claimed unacceptable bandwidth consumption induced by retri...
Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klem...
BMCBI
2008
121views more  BMCBI 2008»
15 years 1 months ago
Modularization of biochemical networks based on classification of Petri net t-invariants
Background: Structural analysis of biochemical networks is a growing field in bioinformatics and systems biology. The availability of an increasing amount of biological data from ...
Eva Grafahrend-Belau, Falk Schreiber, Monika Heine...
EON
2008
15 years 3 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
EWSN
2010
Springer
15 years 8 months ago
Energy-Aware Sparse Approximation Technique (EAST) for Rechargeable Wireless Sensor Networks
Due to non-homogeneous spread of sunlight, sensing nodes typically have non-uniform energy profiles in rechargeable Wireless Sensor Networks (WSNs). An energy-aware work load dist...
Rajib Kumar Rana, Wen Hu, Chun Tung Chou
FOSSACS
2010
Springer
15 years 8 months ago
Retaining the Probabilities in Probabilistic Testing Theory
Abstract. This paper considers the probabilistic may/must testing theory for processes having external, internal, and probabilistic choices. We observe that the underlying testing ...
Sonja Georgievska, Suzana Andova