Developing the Method of Server Controlled Outcomes Management and Variance Analysis Fulltext Access 17 Pages 2009
Abstract Interpretation of Functional Programs using an Attribute Grammar System Fulltext Access 17 Pages 2009
Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks Fulltext Access 17 Pages 2009
Interval-valued fuzzy permutation method and experimental analysis on cardinal and ordinal evaluations Fulltext Access 17 Pages 2009
Recovering Relationships between Documentation and Source Code based on the Characteristics of Software Engineering Fulltext Access 17 Pages 2009
Improvement of a Result on Sequencing Elementary Cellular Automata Rules for Solving the Parity Problem Fulltext Access 17 Pages 2009
Computability of probability measures and Martin-Löf randomness over metric spaces Fulltext Access 18 Pages 2009
Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol Fulltext Access 18 Pages 2009
A Tableau Decision Procedure for ALC With Monotonic Modal Operators and Constant Domains Fulltext Access 18 Pages 2009
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Fulltext Access 18 Pages 2009
Sampling methods for shortest vectors, closest vectors and successive minima Fulltext Access 18 Pages 2009
A Control Flow Analysis for Beta-binders with and without static compartments Fulltext Access 18 Pages 2009
An analysis of the exponential decay principle in probabilistic trust models Fulltext Access 18 Pages 2009
Automatically testing interactive applications using extended task trees Fulltext Access 18 Pages 2009
Solving similarity joins and range queries in metric spaces with the list of twin clusters Fulltext Access 18 Pages 2009
Approximating Probabilistic Behaviors of Biological Systems Using Abstract Interpretation Fulltext Access 18 Pages 2009
Visualizations for assessing convergence and mixing of Markov chain Monte Carlo simulations Fulltext Access 18 Pages 2009
Estimating Bayes factors via thermodynamic integration and population MCMC Fulltext Access 18 Pages 2009
Verified Compilation and the B Method: A Proposal and a First Appraisal Fulltext Access 18 Pages 2009
Partition-based workload scheduling in living data warehouse environments Fulltext Access 18 Pages 2009
A comparative runtime analysis of heuristic algorithms for satisfiability problems Fulltext Access 18 Pages 2009
Rewriting Logic Specification of Membrane Systems with Promoters and Inhibitors Fulltext Access 18 Pages 2009
Some Programming Languages Suggested by Game Models (Extended Abstract) Fulltext Access 18 Pages 2009
Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic Fulltext Access 18 Pages 2009
L-fuzzy Scott Topology and Scott Convergence of Stratified L-filters on Fuzzy Dcpos Fulltext Access 18 Pages 2009
A TLA+ Formal Specification and Verification of a New Real-Time Communication Protocol Fulltext Access 18 Pages 2009