Sciweavers

2205 search results - page 340 / 441
» Mutation Operators for Specifications
Sort
View
IJAR
2008
95views more  IJAR 2008»
15 years 2 months ago
Complexity results for enhanced qualitative probabilistic networks
While quantitative probabilistic networks (QPNs) allow the expert to state influences between nodes in the network as influence signs, rather than conditional probabilities, infer...
Johan Kwisthout, Gerard Tel
IJCSA
2008
102views more  IJCSA 2008»
15 years 2 months ago
New Information and Communication Technologies for the Teaching of Computer Graphic Design
Within the computer aided design (CAD) teaching framework, new information and communication technologies (ICT's) are being set through new tools and methodological changes: ...
G. del Rio-Cidoncha, J. Martinez-Palacios, E. Mart...
108
Voted
IJES
2008
102views more  IJES 2008»
15 years 2 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee
134
Voted
IJLT
2008
184views more  IJLT 2008»
15 years 2 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
141
Voted
FUIN
2006
128views more  FUIN 2006»
15 years 2 months ago
A Rewriting Framework for Rule-Based Programming Dynamic Applications
In recent years light-weighted formal methods are of growing interest in construction and analysis of complex concurrent software system. A new rule-action based term rewriting fr...
Anatoly E. Doroshenko, Ruslan Shevchenko