A 4/3-approximation for the minimum 2-local-vertex-connectivity augmentation in a connected graph Fulltext Access 19 Pages 2005
Incremental mining of information interest for personalized web scanning Fulltext Access 19 Pages 2005
Bounded Model Checking with SNF, Alternating Automata, and Büchi Automata Fulltext Access 19 Pages 2005
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language Fulltext Access 19 Pages 2005
Conversion of coloring algorithms into maximum weight independent set algorithms Fulltext Access 19 Pages 2005
Performance evaluation of demodulation with diversity-a combinatorial approach II: bijective methods Fulltext Access 19 Pages 2005
Modular Architectural Representation and Analysis of Fault Propagation and Transformation Fulltext Access 19 Pages 2005
Evolution Scenarios for Rule-Based Implementations of Language-Based Functionality Fulltext Access 19 Pages 2005
Into the Loops: Practical Issues in Translation Validation for Optimizing Compilers Fulltext Access 19 Pages 2005
Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets Fulltext Access 19 Pages 2005
Optimizing Code Generation from SSA Form: A Comparison Between Two Formal Correctness Proofs in Isabelle/HOL Fulltext Access 19 Pages 2005
Specifying and Verifying Communications Protocols using Mixed Intuitionistic Linear Logic Fulltext Access 19 Pages 2005
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Fulltext Access 19 Pages 2005
IOP: The InterOperability Platform & IMaude: An Interactive Extension of Maude Fulltext Access 19 Pages 2005
QUACK: A Platform for the Quality of New Generation Integrated Embedded Systems Fulltext Access 19 Pages 2005
Semantics and Runtime Monitoring of TLCharts: Statechart Automata with Temporal Logic Conditioned Transitions Fulltext Access 19 Pages 2005
Configurations induced by discrete rotations: periodicity and quasi-periodicity properties Fulltext Access 19 Pages 2005
Characterizations of closed classes of Boolean functions in terms of forbidden subfunctions and Post classes Fulltext Access 19 Pages 2005
Performance of 1 and 10 Gigabit Ethernet cards with server quality motherboards Fulltext Access 20 Pages 2005
An online throughput-competitive algorithm for multicast routing and admission control Fulltext Access 20 Pages 2005
Design and performance evaluation of load distribution strategies for multiple divisible loads on heterogeneous linear daisy chain networks Fulltext Access 20 Pages 2005
Handoff management in wireless data networks using topography-aware mobility prediction Fulltext Access 20 Pages 2005
Processor-embedded distributed smart disks for I/O-intensive workloads: architectures, performance models and evaluation Fulltext Access 20 Pages 2005
Supporting ATAM with a collaborative Web-based software architecture evaluation tool Fulltext Access 20 Pages 2005
Improving the algorithm of Bafna and Pevzner for the problem of sorting by transpositions: a practical approach Fulltext Access 20 Pages 2005
Taylor models and floating-point arithmetic: proof that arithmetic operations are validated in COSY Fulltext Access 20 Pages 2005
Performance modeling and analysis of software architectures: An aspect-oriented UML based approach Fulltext Access 20 Pages 2005
Improved biclustering of microarray data demonstrated through systematic performance tests Fulltext Access 20 Pages 2005
On composition and lookahead delegation of e-services modeled by automata Fulltext Access 20 Pages 2005
A general stability analysis on regional and national voting schemes against noise-why is an electoral college more stable than a direct popular election? Fulltext Access 20 Pages 2005