Sciweavers

20175 search results - page 3905 / 4035
» Is abstraction the key to computing
Sort
View
110
Voted
ASM
2008
ASM
15 years 2 months ago
A First Attempt to Express KAOS Refinement Patterns with Event B
anguage (Event B), hence staying at the same abstraction level. Thus we take advantage from the Event B method: (i) it is possible to use the method during the whole development pr...
Abderrahman Matoussi, Frédéric Gerva...
ATC
2008
Springer
15 years 2 months ago
Scheduling for Reliable Execution in Autonomic Systems
Abstract. Scheduling the execution of multiple concurrent tasks on shared resources such as CPUs and network links is essential to ensuring the reliable operation of many autonomic...
Terry Tidwell, Robert Glaubius, Christopher D. Gil...
95
Voted
BIRD
2008
Springer
141views Bioinformatics» more  BIRD 2008»
15 years 2 months ago
Nested q-Partial Graphs for Genetic Network Inference from "Small n, Large p" Microarray Data
Abstract. Gaussian graphical models are widely used to tackle the important and challenging problem of inferring genetic regulatory networks from expression data. These models have...
Kevin Kontos, Gianluca Bontempi
ICDCS
2010
IEEE
15 years 2 months ago
RoLo: A Rotated Logging Storage Architecture for Enterprise Data Centers
Abstract—We propose RoLo (Rotated Logging), a new logging architecture for RAID10 systems for enhanced energy efficiency, performance and reliability. By spreading destaging I/O...
Yinliang Yue, Lei Tian, Hong Jiang, Fang Wang, Dan...
ACMSE
2006
ACM
15 years 2 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
« Prev « First page 3905 / 4035 Last » Next »