Sciweavers

3555 search results - page 597 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 1 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
130
Voted
BMCBI
2010
126views more  BMCBI 2010»
15 years 1 months ago
Simulation of a Petri net-based Model of the Terpenoid Biosynthesis Pathway
Background: The development and simulation of dynamic models of terpenoid biosynthesis has yielded a systems perspective that provides new insights into how the structure of this ...
Aliah Hazmah Hawari, Zeti-Azura Mohamed-Hussein
ICC
2009
IEEE
168views Communications» more  ICC 2009»
15 years 8 months ago
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
Vinay Joseph, Vinod Sharma, Utpal Mukherji
IAT
2007
IEEE
15 years 7 months ago
Automatically Costed Autonomous Mobility
To share resources in open distributed systems we have developed autonomous mobile programs, which periodically use a cost model to decide where to execute in a network. In additi...
Xiao Yan Deng, Greg Michaelson, Philip W. Trinder
VRML
2003
ACM
15 years 6 months ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser