Sciweavers

15840 search results - page 3058 / 3168
» The Control of Synchronous Systems
Sort
View
FAC
2007
128views more  FAC 2007»
15 years 4 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
GPEM
2007
113views more  GPEM 2007»
15 years 4 months ago
An evolutionary approach to cancer chemotherapy scheduling
In this paper, we investigate the employment of evolutionary algorithms as a search mechanism in a decision support system for designing chemotherapy schedules. Chemotherapy invol...
Gabriela Ochoa, Minaya Villasana, Edmund K. Burke
NETWORK
2006
218views more  NETWORK 2006»
15 years 4 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
IJHPCA
2007
114views more  IJHPCA 2007»
15 years 4 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
IS
2007
15 years 4 months ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
« Prev « First page 3058 / 3168 Last » Next »