Sciweavers

54 search results - page 5 / 11
» Implementing Temporal Integrity Constraints Using an Active ...
Sort
View
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
14 years 1 months ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
DSN
2000
IEEE
13 years 11 months ago
Resource Scheduling in Dependable Integrated Modular Avionics
In the recent development of avionics systems, Integrated Modular Avionics (IMA) is advocated for next generation architecture that needs integration of mixedcriticality real-time...
Yann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Je...
JAIR
2006
141views more  JAIR 2006»
13 years 7 months ago
An Approach to Temporal Planning and Scheduling in Domains with Predictable Exogenous Events
The treatment of exogenous events in planning is practically important in many realworld domains where the preconditions of certain plan actions are affected by such events. In th...
Alfonso Gerevini, Alessandro Saetti, Ivan Serina
MEDINFO
2007
116views Healthcare» more  MEDINFO 2007»
13 years 8 months ago
Knowledge-Level Querying of Temporal Patterns in Clinical Research Systems
Managing time-stamped data is essential to clinical research activities and often requires the use of considerable domain knowledge, which is difficult to support within database ...
Martin J. O'Connor, Ravi D. Shankar, David B. Parr...
SADFE
2008
IEEE
14 years 1 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....