Sciweavers

3555 search results - page 92 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECAL
2007
Springer
15 years 7 months ago
Guided Self-organisation for Autonomous Robot Development
Abstract. The paper presents a method to guide the self-organised development of behaviours of autonomous robots. In earlier publications we demonstrated how to use the homeokinesi...
Georg Martius, J. Michael Herrmann, Ralf Der
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 6 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
OOPSLA
2005
Springer
15 years 7 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst
JDCTA
2008
110views more  JDCTA 2008»
15 years 1 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
ECIS
2004
15 years 2 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett