Sciweavers

484 search results - page 67 / 97
» Structural Symmetry and Model Checking
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 7 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
IGPL
2007
125views more  IGPL 2007»
13 years 7 months ago
Morph Moulder: Teaching Software for HPSG and Description Logics
The graphical software Morph Moulder (MoMo) presented here was originally created for teaching the logical foundations of Head-Driven Phrase Structure Grammar (HPSG) in an e-Learn...
Ekaterina Ovchinnikova, Frank Richter
CDC
2009
IEEE
147views Control Systems» more  CDC 2009»
13 years 5 months ago
A probabilistic approach for control of a stochastic system from LTL specifications
We consider the problem of controlling a continuous-time linear stochastic system from a specification given as a Linear Temporal Logic (LTL) formula over a set of linear predicate...
Morteza Lahijanian, Sean B. Andersson, Calin Belta
BMCBI
2007
102views more  BMCBI 2007»
13 years 7 months ago
qPIPSA: Relating enzymatic kinetic parameters and interaction fields
Background: The simulation of metabolic networks in quantitative systems biology requires the assignment of enzymatic kinetic parameters. Experimentally determined values are ofte...
Razif R. Gabdoulline, Matthias Stein, Rebecca C. W...
ASWEC
2006
IEEE
14 years 1 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge