Sciweavers

3555 search results - page 597 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
128
Voted
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 4 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
155
Voted
BMCBI
2010
126views more  BMCBI 2010»
15 years 3 months ago
Simulation of a Petri net-based Model of the Terpenoid Biosynthesis Pathway
Background: The development and simulation of dynamic models of terpenoid biosynthesis has yielded a systems perspective that provides new insights into how the structure of this ...
Aliah Hazmah Hawari, Zeti-Azura Mohamed-Hussein
123
Voted
ICC
2009
IEEE
168views Communications» more  ICC 2009»
15 years 10 months ago
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
Vinay Joseph, Vinod Sharma, Utpal Mukherji
137
Voted
IAT
2007
IEEE
15 years 10 months ago
Automatically Costed Autonomous Mobility
To share resources in open distributed systems we have developed autonomous mobile programs, which periodically use a cost model to decide where to execute in a network. In additi...
Xiao Yan Deng, Greg Michaelson, Philip W. Trinder
133
Voted
VRML
2003
ACM
15 years 9 months ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser