Sciweavers

1928 search results - page 275 / 386
» Integrity Constraints in OWL
Sort
View
FIW
1998
130views Communications» more  FIW 1998»
13 years 11 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
JSAC
2007
140views more  JSAC 2007»
13 years 10 months ago
Cross-layer resource allocation over wireless relay networks for quality of service provisioning
— We propose a physical-datalink cross-layer resource allocation scheme over wireless relay networks for quality-ofservice (QoS) guarantees. By integrating information theory wit...
Jia Tang, Xi Zhang
TACAS
2010
Springer
255views Algorithms» more  TACAS 2010»
13 years 8 months ago
Satisfiability Modulo the Theory of Costs: Foundations and Applications
Abstract. We extend the setting of Satisfiability Modulo Theories (SMT) by introducing a theory of costs C, where it is possible to model and reason about resource consumption and ...
Alessandro Cimatti, Anders Franzén, Alberto...
IJKDB
2010
170views more  IJKDB 2010»
13 years 7 months ago
Clustering Genes Using Heterogeneous Data Sources
Clustering of gene expression data is a standard exploratory technique used to identify closely related genes. Many other sources of data are also likely to be of great assistance...
Erliang Zeng, Chengyong Yang, Tao Li, Giri Narasim...
JLP
2011
155views more  JLP 2011»
13 years 5 months ago
QoS negotiation in service composition
Service composition in Service Oriented Computing concerns not only integration of heterogeneous distributed applications but also dynamic selection of services. Quality of Servic...
Maria Grazia Buscemi, Ugo Montanari