Sciweavers

15251 search results - page 130 / 3051
» Network Science - Theory and Application
Sort
View
GI
2005
Springer
14 years 2 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
ERSHOV
2009
Springer
14 years 1 months ago
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
Abstract. The Java Supercompiler (JScp) is a specializer of Java programs based on the Turchin's supercompilation method and extended to support imperative and object-oriented...
Andrei V. Klimov
COMPLEX
2009
Springer
14 years 3 months ago
Characterizing the Structural Complexity of Real-World Complex Networks
Although recent research has shown that the complexity of a network depends on its structural organization, which is linked to the functional constraints the network must satisfy, ...
Jun Wang, Gregory M. Provan
WG
2004
Springer
14 years 2 months ago
Treelike Comparability Graphs: Characterization, Recognition, and Applications
An undirected graph is a treelike comparability graph if it admits a transitive orientation such that its transitive reduction is a tree. We show that treelike comparability graphs...
Sabine Cornelsen, Gabriele Di Stefano
CAD
2006
Springer
13 years 9 months ago
Automatic least-squares projection of points onto point clouds with applications in reverse engineering
A novel method for projecting points onto a point cloud, possibly with noise, is presented based on the point directed projection (DP) algorithm proposed by Azariadis P., Sapidis ...
Yu-Shen Liu, Jean-Claude Paul, Jun-Hai Yong, Pi-Qi...