Sciweavers

2111 search results - page 38 / 423
» How to Program Pervasive Systems
Sort
View
113
Voted
MOBISYS
2008
ACM
16 years 1 days ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
100
Voted
LPNMR
2007
Springer
15 years 6 months ago
Programming Applications in CIFF
We show how to deploy the CIFF System 4.0 for abductive logic programming with constraints in a number of applications, ranging from combinatorial applications to web management. W...
Paolo Mancarella, Fariba Sadri, Giacomo Terreni, F...
97
Voted
SIGCSE
2002
ACM
207views Education» more  SIGCSE 2002»
15 years 3 days ago
Exploration of process interaction in operating systems: a pipe-fork simulator
Abstract This paper examines the use of a simulator to explore process interaction in Unix. The simulator allows instructors to trace through a variety of programs and to show how ...
Steven Robbins
113
Voted
SAS
2001
Springer
149views Formal Methods» more  SAS 2001»
15 years 4 months ago
Analysis of Multithreaded Programs
Abstract. The field of program analysis has focused primarily on sequential programming languages. But multithreading is becoming increasingly important, both as a program structu...
Martin C. Rinard
115
Voted
EUROCAST
1994
Springer
139views Hardware» more  EUROCAST 1994»
15 years 4 months ago
Illustrating Constraint Programming Systems in Logistic Planning
Logistic systems analysts use a wide array of modeling systems such as algebraic and logic programs. Two simple examples show how they mesh as Constraint Logic programs, emphasizin...
Jean-Michel Thizy