Sciweavers

GG
2010
Springer
13 years 7 months ago
A False History of True Concurrency: From Petri to Tools
I briefly review the history of the unfolding approach to model checking. Carl Adam Petri passed away on July 2, 2010. I learnt about his death three days later, a few hours after ...
Javier Esparza
GG
2010
Springer
13 years 7 months ago
Verification of Graph Transformation Systems with Context-Free Specifications
We introduce an analysis method for graph transformation systems which checks that certain forbidden graphs are not reachable from the start graph. These forbidden graphs are speci...
Barbara König, Javier Esparza
DLT
2010
13 years 7 months ago
Minimization of Deterministic Bottom-Up Tree Transducers
We show that for every deterministic bottom-up tree transducer, a unique equivalent transducer can be constructed which is minimal. The construction is based on a sequence of norma...
Sylvia Friese, Helmut Seidl, Sebastian Maneth
CSR
2010
Springer
13 years 7 months ago
The max quasi-independent set Problem
Nicolas Bourgeois, Aristotelis Giannakos, Giorgio ...
ITICSE
2010
ACM
13 years 7 months ago
Hands-on approach to teaching wireless sensor networks at the undergraduate level
Teaching wireless sensor networks (WSNs) at the undergraduate level is both challenging and rewarding. WSNs include low-level programming and debugging, power-aware operations, no...
Anna Förster, Mehdi Jazayeri
ITICSE
2010
ACM
13 years 7 months ago
When CS 1 is biology 1: crossdisciplinary collaboration as CS context
We present the curriculum, deployment, and initial evaluation of a course, BioCS1, designed to serve as CS1 and Biology1 for majors of either (or both) disciplines. Cotaught by pr...
Zachary Dodds, Ran Libeskind-Hadas, Eliot Bush
GI
2008
Springer
13 years 8 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
GI
2008
Springer
13 years 8 months ago
Bewertung und Klassifikation von Bedrohungen im Umfeld der elektronischen Gesundheitskarte
: Dieser Beitrag identifiziert und klassifiziert mögliche Angreifer und Angriffe rund um die Einführung der neuen elektronischen Gesundheitskarte bzw. rund um die Telematik-Infra...
Ali Sunyaev, Michael J. Huber, Christian Mauro, Ja...
GI
2008
Springer
13 years 8 months ago
Menu Structuring for Mobile Devices
: This project sets a discussion about possible improvements for mobile menu structuring. Navigation on mobile phones is supposed to get quicker and easier. To reach for better use...
Katrin Sauerwein, Nathalie Prevost, Alexander De L...