Sciweavers

12637 search results - page 2339 / 2528
» Security for Extensible Systems
Sort
View
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
15 years 3 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
ICFEM
2009
Springer
15 years 2 months ago
Graded-CTL: Satisfiability and Symbolic Model Checking
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
Alessandro Ferrante, Margherita Napoli, Mimmo Pare...
163
Voted
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
15 years 2 months ago
A riemannian-geometry approach for dynamics and control of object manipulation under constraints
A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...
Suguru Arimoto, Morio Yoshida, Masahiro Sekimoto, ...
BMCBI
2011
15 years 2 days ago
ATAQS: A computational software tool for high throughput transition optimization and validation for selected reaction monitoring
Background: Since its inception, proteomics has essentially operated in a discovery mode with the goal of identifying and quantifying the maximal number of proteins in a sample. I...
Mi-Youn K. Brusniak, Sung-Tat Kwok, Mark Christian...
COMCOM
2011
15 years 1 days ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
« Prev « First page 2339 / 2528 Last » Next »