Sciweavers

201 search results - page 20 / 41
» An Authorization Logic With Explicit Time
Sort
View
APN
2004
Springer
14 years 4 months ago
Reachability Set Generation for Petri Nets: Can Brute Force Be Smart?
Generating the reachability set is one of the most commonly required step when analyzing the logical or stochastic behavior of a system modeled with Petri nets. Traditional “expl...
Gianfranco Ciardo
BIBM
2009
IEEE
183views Bioinformatics» more  BIBM 2009»
14 years 3 months ago
Modeling Protein Interaction Networks with Answer Set Programming
—In this paper we propose the use of answer set programming (ASP) to model protein interaction networks. We argue that this declarative formalism rivals the popular boolean netwo...
Timur Fayruzov, Martine De Cock, Chris Cornelis, D...
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
14 years 3 months ago
Student Model of Historical Text Comprehension
: In this contribution we present a Learner Model (LM) of Historical Text Comprehension (HTC), which infers the cognitive profile of learner’s global comprehension concerning the...
Grammatiki Tsaganou, Maria Grigoriadou, Theodora C...
CORR
2007
Springer
84views Education» more  CORR 2007»
13 years 10 months ago
Undirected Graphs of Entanglement Two
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
Walid Belkhir, Luigi Santocanale
XPU
2007
Springer
14 years 4 months ago
Empirical Evidence Principle and Joint Engagement Practice to Introduce XP
Bringing software process change to an organisation is a real challenge. The authors have shown a sample attempt to carry out a process change and then reflected on its results and...
Lech Madeyski, Wojciech Biela