Sciweavers

1864 search results - page 286 / 373
» Formal topology and domains
Sort
View
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
14 years 6 days ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
MPC
2010
Springer
246views Mathematics» more  MPC 2010»
13 years 10 months ago
Abstraction of Object Graphs in Program Verification
ion of Object Graphs in Program Verification Yifeng Chen1 and J.W. Sanders2 1 HCST Key Lab at School of EECS, Peking University, China. 2 UNU-IIST, Macao. A set-theoretic formalism...
Yifeng Chen, Jeff W. Sanders
AMAI
2008
Springer
13 years 9 months ago
Set based logic programming
In a previous paper [BMR01], the authors showed that the mechanism underlying Logic Programming can be extended to handle the situation where the atoms are interpreted as subsets o...
Howard A. Blair, Victor W. Marek, Jeffrey B. Remme...
BMCBI
2010
277views more  BMCBI 2010»
13 years 9 months ago
PCA2GO: a new multivariate statistics based method to identify highly expressed GO-Terms
Background: Several tools have been developed to explore and search Gene Ontology (GO) databases allowing efficient GO enrichment analysis and GO tree visualization. Nevertheless,...
Marc Bruckskotten, Mario Looso, Franz Cemic, Anne ...
IJNM
2006
175views more  IJNM 2006»
13 years 8 months ago
An OPNET-based simulation approach for deploying VoIP
These days a massive deployment of VoIP is taking place over IP networks. VoIP deployment is a challenging task for network researchers and engineers. This paper presents a detaile...
Khaled Salah, A. Alkhoraidly