Sciweavers

10870 search results - page 2050 / 2174
» Model Checking Programs
Sort
View
JSAC
2006
143views more  JSAC 2006»
15 years 1 months ago
Capacity and QoS for a Scalable Ring-Based Wireless Mesh Network
The wireless mesh network (WMN) is an economical solution to support ubiquitous broadband services. This paper investigates the tradeoffs among quality-of-service (QoS), capacity, ...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
JUCS
2006
145views more  JUCS 2006»
15 years 1 months ago
Computer Science, Logic, Informatics Education
: Our aim is to discuss what, when and, how deep logic should be taught in the computer science education in connection with the so called "Bologna process". We survey th...
Katalin Pásztor-Varga, Magda Várter&...
KES
2006
Springer
15 years 1 months ago
The Repository Method for Chance Discovery in Financial Forecasting
Abstract. The aim of this work is to forecast future events in financial data sets, in particular, we focus our attention on situations where positive instances are rare, which fal...
Alma Lilia Garcia-Almanza, Edward P. K. Tsang
KES
2006
Springer
15 years 1 months ago
Integrated Document Browsing and Data Acquisition for Building Large Ontologies
Named entities (e.g., "Kofi Annan", "Coca-Cola", "Second World War") are ubiquitous in web pages and other types of document and often provide a simpl...
Felix Weigel, Klaus U. Schulz, Levin Brunner, Edua...
LISP
2006
105views more  LISP 2006»
15 years 1 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy
« Prev « First page 2050 / 2174 Last » Next »