Sciweavers

4890 search results - page 836 / 978
» From system specifications to component behavioral models
Sort
View
RANDOM
1998
Springer
14 years 2 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang
VIS
2004
IEEE
156views Visualization» more  VIS 2004»
14 years 11 months ago
Force-Feedback-Enhanced Navigation for Interactive Visualization of Coronary Vessels
Coronary heart disease (CHD) is the number one killer in the United States. Although it is well known that CHD mainly occurs due to blocked arteries, there are contradictory resul...
Thomas Wischgoll, Elke Moritz, Jörg Meyer
CANDC
2009
ACM
13 years 8 months ago
A tale of two online communities: fostering collaboration and creativity in scientists and children
There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this proc...
Cecilia R. Aragon, Sarah S. Poon, Andrés Mo...
BMCBI
2005
96views more  BMCBI 2005»
13 years 10 months ago
Overview of BioCreAtIvE task 1B: normalized gene lists
Background: Our goal in BioCreAtIve has been to assess the state of the art in text mining, with emphasis on applications that reflect real biological applications, e.g., the cura...
Lynette Hirschman, Marc E. Colosimo, Alexander A. ...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
14 years 11 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...