Sciweavers

20175 search results - page 61 / 4035
» Is abstraction the key to computing
Sort
View
103
Voted
FUIN
2010
89views more  FUIN 2010»
14 years 11 months ago
Computing Maximal Error-detecting Capabilities and Distances of Regular Languages
Abstract. A (combinatorial) channel consists of pairs of words representing all possible inputoutput channel situations. In a past paper, we formalized the intuitive concept of “...
Stavros Konstantinidis, Pedro V. Silva
93
Voted
ICDCS
2008
IEEE
15 years 7 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
BROADNETS
2005
IEEE
15 years 6 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
APN
2004
Springer
15 years 6 months ago
Time Petri Nets with Inhibitor Hyperarcs. Formal Semantics and State Space Computation
Abstract. In this paper, we define Time Petri Nets with Inhibitor Hyperarcs (IHTPN) as an extension of T-time Petri nets where time is associated with transitions. In this model, ...
Olivier H. Roux, Didier Lime
TEC
2008
99views more  TEC 2008»
15 years 14 days ago
A Drug Candidate Design Environment Using Evolutionary Computation
Abstract-- This article describes the Candidate Design Environment we developed for efficient identification of promising drug candidates. Developing effective drugs from active mo...
M. Ihsan Ecemis, J. Wikel, C. Bingham, Eric Bonabe...