| Sample search results for: a-1 m-wing building |
| 1 | Computational ThinkingComputational Thinking Jeannette M. Wing | ||
|
Summary: Computational ThinkingComputational Thinking Jeannette M. Wing President's Professor of Computer... Computational Thinking Jeannette M. Wing Paper off http://www.cs.cmu.edu/~wing/ #12;Computing... Jeannette M. Wing guided by the following concerns... #12;Measures of ... |
|||
|
Source: Reddy, Raj - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 2 | The View from Carnegie Mellon: What We Did and What We're Doing | ||
|
Summary: and Information Technology, Pittsburgh, PA, November 17, 2005 Jeannette M. Wing President's Professor of Computer... Science Head, Computer Science Department Carnegie Mellon University #12;2NCWIT Jeannette M. Wing Carnegie... and Interdisciplinary #12;3NCWIT Jeannette M. ... |
|||
|
Source: Reddy, Raj - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 3 | Software Security Jeannette M. Wing | ||
|
Summary: Software Security Jeannette M. Wing Computer Science Department Carnegie Mellon University... . References [1] M. Howard, J. Pincus, and J.M. Wing, "Measuring Relative Attack Surfaces," Proceedings... -169 Technical Report, August 2003. [2] P.K. Manadhata, J.M. Wing, ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 4 | Software Engineering Institute Technical Report | ||
|
Summary: Specifying Functional and Timing Behavior for Real-Time Applications M.R. Barbacci J.M. Wing Approved... Force Avionics Laboratory Under Contract F33616-64-K-1520. Additional support for J.M. Wing was provided... ., are appreciated. Dr. Mario R. Barbacci Professor Jeannette M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 5 | EMERGENCY RESPONSE PLAN TECHNOLOGICAL INSTITUTE BUILDING (TECH) | ||
|
Summary: Materials Alarm One group of labs in Tech second floor M Wing M252, M260, M266, M277 is equipped... EMERGENCY RESPONSE PLAN TECHNOLOGICAL INSTITUTE BUILDING (TECH) NORTHWESTERN UNIVERSITY Updated... July 22, 2010 The Technological Institute Building (Tech) at 2145 Sheridan Road, Evanston, IL 60208 |
|||
|
Source: Grzybowski, Bartosz A. - Departments of Chemistry & Chemical and Biological Engineering, Northwestern University |
|||
|
Collection: Materials Science ; Chemistry |
|||
| 6 | Proving Correctness of a Controller Algorithm for the RAID Level 5 System | ||
|
Summary: Lynch a Jeannette M. Wing March 1998 CMUCS98117 a MIT Lab. for Computer Science, 545 Technology... building such a tool, our approach consists of studying several controller algorithms manually |
|||
|
Source: Carnegie Mellon University, School of Computer Science |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 7 | Formal Methods: State of the Art and Future Edmund M. Clarke and Jeannette M. Wing | ||
|
Summary: Formal Methods: State of the Art and Future Directions Edmund M. Clarke and Jeannette M. Wing... 0481, or permissions@acm.org. #12; 2 \Delta E.M. Clarke and J.M. Wing About Programs---Mechanical verification... that allow us to handle #12; 6 \Delta E.M. Clarke and J.M. ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science, Informedia Project; Clarke, Edmund M. - Department of Electrical and Computer Engineering, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 8 | Developing Applications for Heterogeneous | ||
|
Summary: , Dennis L. Doubleday, Charles B. Weinstock, and Jeannette M. Wing Carnegie Mellon University ABSTRACT... commands to control motors and other 8 M.R. Barbacci, D. L. Doubleday, C. B. Weinstock, and J. M. Wing #12... M.R. Barbacci, D. L. Doubleday, C. B. Weinstock, and J. M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 9 | Signature Matching: A Tool for Using Software Libraries | ||
|
Summary: Signature Matching: A Tool for Using Software Libraries AMY MOORMANN ZAREMSKI and JEANNETTE M. WING... Engineering and Methodology, VO1. 4, No. ~, April 1995 #12;148 . A. Moormann Zaremskl and J. M. Wing signature... of the argument to T is a.1 In general, when we 1We ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 10 | Experience with the Larch Prover Jeannette M. Wing and Chun Gong | ||
|
Summary: Experience with the Larch Prover Jeannette M. Wing and Chun Gong School of Computer Science... - thesis,Kluwer, 1987. [5] D. L. Detlefs, M. P. Herlihy, and J. M. Wing. Inheritance of synchronization... -Verlag, 1979. [11] J.V. Guttag, J.J.Homing, and J.M. Wing. The ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 11 | EMERGENCY RESPONSE PLAN Ford Motor Company Engineering Design Center (Ford) | ||
|
Summary: occupants are expected to learn building safety procedures and to follow the instructions of department... Company Engineering Design Center Building Safety Committee on June 8, 2006 with revision on August 19... and then follow appropriate protocol. The building alarm is an "intelligent" system which that every alarm device |
|||
|
Source: Chen, Wei - Department of Mechanical Engineering, Northwestern University; Grzybowski, Bartosz A. - Departments of Chemistry & Chemical and Biological Engineering, Northwestern University |
|||
|
Collection: Chemistry ; Engineering ; Materials Science |
|||
| 12 | Mathematics in Computer Science School of Computer Science | ||
|
Summary: Pittsburgh, PA Jeannette M. Wing Sixth International Conference on Mathematics of Program Construction July... 2002, Dagstuhl, Germany #12;2Math in CS Curricula Jeannette M. Wing Prelude: Three Observations... to the undergraduate level. #12;3Math in CS Curricula Jeannette M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 13 | 58 January 2008/Vol. 51, No. 1 COMMUNICATIONS OF THE ACM FIVE DEEP QUESTIONS | ||
|
Summary: foundations and help engineer the systems we can only imagine. BY JEANNETTE M. WING 1 I thank Robert L... is intelligence? What is information?1 (How) can we build complex systems simply? There is nothing special about... the emergent behavior of multiple interacting systems. Can we build systems with simple ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 14 | Programming ELSEVIER Science of ComputerProgramming28 (1997) 273-299 | ||
|
Summary: study in model checking software systems Jeannette M. Wing a,*, Mandana Vaziri-Farahani b,1 a Computer... machines. #12;J.M. Wing, M. Vaziri-Farahanil Science of Computer Programming 28 (1997) 273-299 275 We thus... 7. #12;276 J.M. Wing, M. Vaziri-FarahanilScience of ... |
|||
|
Source: Vaziri, Mandana - Program Analysis and Transformation Group, IBM T.J. Watson Research Center; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 15 | INTRODUCTION Academia Sinica, Taiwan | ||
|
Summary: that rapidly respond when attacks commence. Michael Howard, Jon Pincus, and Jeannette M. Wing report on work... at the conference. The first section deals with the classical issue of cryptographic protocols. How can we build... security has been the change of emphasis from building impenetrable systems to ... |
|||
|
Source: Tygar, Doug - Department of Electrical Engineering and Computer Sciences, University of California at Berkeley |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 16 | re:Dress MSU MUSEUM EXHIBIT PUTS A `GREEN' TWIST ON FASHION DESIGN | ||
|
Summary: . "Students tackled the `green' aspects of the design with different strategies," explains Theresa M. Winge... artifacts and natural history specimens, with collections numbering more than 1 million in four buildings... , exhibitions, research and the building and stewardship of collections that focus on ... |
|||
|
Source: Liu, Taosheng - Department of Psychology, Michigan State University |
|||
|
Collection: Biology and Medicine |
|||
| 17 | Reasoning About Atomic Objects Maurice P. Herllhy and Jeannette M. Wing | ||
|
Summary: Reasoning About Atomic Objects Maurice P. Herllhy and Jeannette M. Wing Computer Science Department... Carnegie Mellon University Pittsburgh, Pennsylvania 15213-3890 U.S.A. 1 Abstract Atomic transactions... . A history H is well-formed is it satisfies the following conditions for all transactions ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 18 | COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 33 omputational thinking | ||
|
Summary: without understanding its every detail. It is LISAHANEY Viewpoint Jeannette M. Wing Computational Thinking... . Jeannette M. Wing (wing@cs.cmu.edu) is the President's Professor of Computer Science in and head... COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 33 C omputational thinking ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science; Rosson, Mary Beth - College of Information Sciences and Technology, Pennsylvania State University; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 19 | ANTICIPATING DYNAMIC LOADS IN HANDLING OBJECTS. Alan M. Wing | ||
|
Summary: 1 ANTICIPATING DYNAMIC LOADS IN HANDLING OBJECTS. Alan M. Wing Sensory Motor Neuroscience Centre... , The University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK. a.m.wing@bham.ac.uk J. Randall Flanagan... in humans. In A.M. Wing, P. Haggard & J.R. Flanagan (Eds) Hand and Brain: ... |
|||
|
Source: Birmingham, University of - School of Psychology, Sensory Motor Neuroscience Centre; Flanagan, Randy - Departments of Psychology & Physiology, Queen's University (Kingston) |
|||
|
Collection: Biology and Medicine |
|||
| 20 | Open Building List Winter 2011 Winter Quarter 2011 Jan 3rd | ||
|
Summary: CLASSES/RENOVATIONS 2/24/2011 Adventure Recreation Ctr (ARC) 855 Woody Hayes Dr. M-R 6a-1a F 6a-10p S 8a... -10p N 8a-1a Ag Admin (AA) 2120 Fyffe Rd. M 7a-7p T/W 7a-6:30p R/F 7a-5p RM 045 FAES M-W 8a-8p R-F 8a... entrance to request access. Drake Union 1849 Cannon Dr M-F ... |
|||
|
Source: Ohio State University, Department of Industrial, Welding, and Systems Engineering, Biodynamics Laboratories |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 21 | Kelvingrove Art Gallery | ||
|
Summary: Building 11 Eldon St Aerospace Engineering A1 - James Watt South Building Anderson College C1 Archaeology D... 11 Eldon St Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1... - Hetherington ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 22 | Open Building List Spring 2011 Spring Quarter 2011 Mar 28th | ||
|
Summary: /8/2011 Adventure Recreation Ctr (ARC) 855 Woody Hayes Dr. M-R 6a-1a F 6a-10p S 8a-10p N 8a-1a Ag Admin (AA) 2120... -F 7a-1a S-N 10a-1a Dreese Lab (DL) 2015 Neil Avenue M/W 7a-730p T/R 7a-10p F 7a-530p Keycard: Aaron... (ST) ... |
|||
|
Source: Ohio State University, Department of Industrial, Welding, and Systems Engineering, Biodynamics Laboratories |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 23 | THE CENTRE FOR APPLIED LINGUISTICS INDUCTION MEETINGS OCTOBER 2011 | ||
|
Summary: .00 Room A1.06 (First floor of social Sciences Building) MA IN ENGLISH LANGUAGE TEACHING MA IN ENGLISH... Social Sciences Building) MA IN ENGLISH LANGUAGE TEACHING & MULTIMEDIA MONDAY 3 OCTOBER 2.00 Room A1... Sciences Building) MSc in ... |
|||
|
Source: Goldschmidt, Christina - Department of Statistics, University of Warwick |
|||
|
Collection: Mathematics |
|||
| 24 | University Avenue ChurchStreet | ||
|
Summary: St Aerospace Engineering A1 James Watt South Building AMICUS E13 68 Oakfield Av Alexander Stone... Electronics & Electrical Engineering E7 Rankine Building Engineering Faculty Office A1 James Watt South... Building A2 James Watt ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering; Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh |
|||
|
Collection: Biology and Medicine ; Engineering ; Physics |
|||
| 25 | Accommodation Services D14 -73 Great George Street Accounting & Finance E12 -65-73 Southpark Avenue | ||
|
Summary: Aerospace Engineering A1 - James Watt South Building AMICUS E13 - 68 Oakfield Avenue Anderson College C1... Office A1 - James Watt South Building English Language D15 - 12 University Gardens English Literature D15... Watt South Building ... |
|||
|
Source: St Andrews, University of - School of Mathematics and Statistics, Centre for Interdisciplinary Research in Computational Algebra |
|||
|
Collection: Mathematics |
|||
| 26 | Kelvingrove Art Gallery | ||
|
Summary: Andrews Building Aerospace Engineering A1 - James Watt South Building AMICUS E13 - 68 Oakfield Avenue... Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1 - James Watt South... North ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 27 | Presented at the 19th International Workshop on Security Protocols, Cambridge, UK, March 28-30, 2011 (to appear in LNCS, Springer Verlag) | ||
|
Summary: Virgil Gligor and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania 15213 gligor... contents? We need to 1 #12;2 Virgil Gligor and Jeannette M. Wing trust the person who wrote the page... failures, it uses insurance-based recovery mechanisms. #12;4 Virgil Gligor and Jeannette ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 28 | Towards a Theory of Trust in Networks of Humans and Computers | ||
|
Summary: Towards a Theory of Trust in Networks of Humans and Computers Virgil Gligor and Jeannette M. Wing... to #12;2 Virgil Gligor and Jeannette M. Wing trust the person who wrote the page, the computer that hosts... failures, it uses insurance-based recovery mechanisms. #12;4 Virgil Gligor and Jeannette ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 29 | Open Building List Summer 2011 Summer Quarter 2011 June 20th | ||
|
Summary: Street M-F 7a-midngt S 9a-1a N 10a-midngt #12;BUILDING DAY HOURS LIBRARY HOURS LAB HOURS COMMENT CLASSES... B&M Wings M-F 6a-6p A Wing M-F 7a-5p #12;BUILDING DAY HOURS LIBRARY HOURS LAB HOURS COMMENT CLASSES... ) 855 Woody Hayes Dr. M-R ... |
|||
|
Source: Jones, Michelle - Department of Horticulture and Crop Science, Ohio State University |
|||
|
Collection: Biology and Medicine |
|||
| 30 | Kelvingrove Art Gallery | ||
|
Summary: Adult & Continuing Education E14 - St Andrews Building 11 Eldon Street Aerospace Engineering A1 - James... Street Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1 - James... James Watt South ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 31 | University Avenue ChurchStreet | ||
|
Summary: & Continuing E14 St Andrew's Education Building, 11 Eldon St Aerospace Engineering A1 James Watt South... St Andrew's Building, 11 Eldon St Electronics & Electrical Engineering, School of A1 James Watt... Maths Building ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering; Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh |
|||
|
Collection: Biology and Medicine ; Engineering ; Physics |
|||
| 32 | Unintrusive Ways to Integrate Formal Specifications in Jeannette M. Wing and Amy Moormann Zaremski | ||
|
Summary: Unintrusive Ways to Integrate Formal Specifications in Practice Jeannette M. Wing and Amy Moormann... such as the one in Figure 9. Let us build up to a trait that describes well-formed instance pictures by beginning... Picture Trait insert arrow(move all boxes(pic delta) a) Next we define a trait that builds ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 33 | Int J Softw Tools Technol Transfer (2003) 4: 261265 / Digital Object Identifier (DOI) 10.1007/s10009-002-0105-2 The opinion corner | ||
|
Summary: 10009-002-0105-2 The opinion corner Platitudes and attitudes Jeannette M. Wing School of Computer... about the increase in complexity of a system. #12;262 J.M. Wing: Platitudes and attitudes... con- sider the science and the engineering ingenuity needed to #12;264 J.M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 34 | Lecture 8: Building Heaps Max-Heapify | ||
|
Summary: #12;Lecture 8: Building Heaps Heaps data structure (recall): · An array A[1..n] of n comparable keys... [j] · There are max-heap and min-heap. We use max-heap. · A[1] is the maximum among the n keys. · Viewing heap... an array: · Given: an array of n keys ... |
|||
|
Source: Kondrak, Greg - Department of Computing Science, University of Alberta |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 35 | TOWARDS A SCIENCE OF SURVIVABILITY: A Research Agenda and a Specific Method | ||
|
Summary: 1 TOWARDS A SCIENCE OF SURVIVABILITY: A Research Agenda and a Specific Method Jeannette M. Wing... Institute, CMU/SEI-97-TR-013, November 1997, revised May 1999. [JWLL00] Somesh Jha, Jeannette M. Wing... . Phase One We build a scenario graph representing the sequences of states and events ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 36 | Technical Report CMU/SEI-89-TR-034 | ||
|
Summary: Manual (Version 2) Mario R. Barbacci Jeannette M. Wing September 1989 #12;Technical Report CMU/SEI-89-TR... ) Mario R. Barbacci Jeannette M. Wing Software for Heterogeneous Machines Project Unlimited distribution... /SEI-89-TR-34 #12;List of Tables Table A-1: Axioms ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 37 | Formal Methods: State of the Art and Future Edmund M. Clarke and Jeannette M. Wing | ||
|
Summary: Formal Methods: State of the Art and Future Directions Edmund M. Clarke and Jeannette M. Wing... ) the feasibility of building a formal model of a system that is readable and reviewable by application experts... checking is a technique that relies on building a finite model of a system and checking that a ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 38 | A Symbiotic Relationship Between Formal Methods and Security | ||
|
Summary: A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing December 1998 CMU... . In particular for a system to be certified A.1 according to the Orange Book means that one formally specify... proving tools. To get one's system certified A.1, one ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 39 | A Symbiotic Relationship Between Formal Methods and Security | ||
|
Summary: A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing December 1998 CMU... security requirements in Government contracts. In particular for a system to be certi ed A.1 according... in the development of theorem proving tools. To get one's system certi ed ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 40 | A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing" | ||
|
Summary: A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing" School of Computer... in Government contracts. In particular for a system to be certified A.1 according to the Orange Book means... in the development of theorem proving tools. To get one's system certified ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 41 | Automatic Discovery of Mutual Exclusion Algorithms (Preliminary Version) | ||
|
Summary: a[0] = me 3 a[me] = 1 4 while a[1] = next 5 a[me] = 0 6 endwhile 7 endwhile 8 critical section 9 a... endwhile 6 critical section 7 a[me] = 0 1 a[me] = 1 2 b[me] = me 3 a[1] = 0 4 a[me] = a[0] 5 while b... [next] != a[1] 6 endwhile 7 critical section 8 b[me] = next ... |
|||
|
Source: Taubenfeld, Gadi - School of Computer Science, Interdisciplinary Center Herzliya |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 42 | T-SEll 5/2//25084 Extending lna Jo with Temporal Logic | ||
|
Summary: T-SEll 5/2//25084 Extending lna Jo with Temporal Logic Jeannette M. Wing Mark R. Nixon Reprinted... Corporation. In ad- currently available to state concurrency requirements. dition, J. M. Wing was supported... of with System Development Corporation, Santa Monica, CA 90406. J. M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 43 | The University of Glasgow, charity number SC004401 Bicycle parking available at Public use Department only | ||
|
Summary: Map Key A1 James Watt Building (South) A3 Thomson Building A4 Pearce Lodge A10 Gilbert Scott Building... Street Wellington Church U A1 A3 A4 A9 A7 A10 A12 A20 E9 B1B10 E6 E10 E4 B2 E8E7 B8 B3 B7 B6 B4 B4 B4 C7 C10 C2 C1 C... Department only Adam ... |
|||
|
Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering |
|||
|
Collection: Engineering ; Biology and Medicine |
|||
| 44 | Liveness-Preserving Atomicity Abstraction Alexey Gotsman and Hongseok Yang | ||
|
Summary: lift the notion of linearizability to libraries as follows. Definition 2. For libraries A1 and A2... with sig(A1) = sig(A2) we say that A2 lin- earizes A1, written A1 A2, if H1 history( ... |
|||
|
Source: Oxford, University of - Computing Laboratory, Quantitative Analysis and Verification Group |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 45 | Week 2: DFA and NFA 1. Exercise 2.2.1 | ||
|
Summary: ) 4. Suppose = {a, b, c}. Build a DFA A1 that accepts exactly the words containing ac as a subword... should occur in between. Represent this constraint L1 as a DFA A1. Suppose that there is another... . Represent the constraint L2 as a DFA A2. Do the product construction of ... |
|||
|
Source: Coquand, Thierry - Department of Computer Science and Engineering, Chalmers University of Technology |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 46 | Computational thinking and thinking about computing | ||
|
Summary: Computational thinking and thinking about computing BY JEANNETTE M. WING* Computer Science... and molecular computers, as well (cf. §2a). J. M. Wing3718 Phil. Trans. R. Soc. A (2008) #12;communication... , it is worth revisiting this question again, with a specific focus on earlier years. J. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 47 | Lazy In nite-State Analysis of Security David Basin | ||
|
Summary: )) | Says a b (Crypt b1 (Pair (Agent a1) (Nonce na) )) <- t, a == a1, b == b1, Says _ a' (Crypt a1' (Pair... (Nonce na') (Nonce nb))) <-t, a == a', a' == a1', na == na'] attacker t = [Says Spy a msg | a <- [Alice... 1 ... |
|||
|
Source: Basin, David - Departement Informatik, Eidgenössische Technische Hochschule Zürich (ETHZ) |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 48 | Hints to Speci ers Jeannette M. Wing | ||
|
Summary: Hints to Speci ers Jeannette M. Wing May 22, 1995 CMU-CS-95-118r School of Computer Science... . Suppose is a state transition relation, : State Action ! 2State Then an example of choice is: (s a1) = ftg... (s a2) = fug which says from state s you can either do the action ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 49 | DESIGNING AIRPORT PASSENGER BUILDINGS FOR THE 21st CENTURY | ||
|
Summary: will produce a new generation of super jumbo aircraft, with 90m. wing spans, and able to carry about 800... DESIGNING AIRPORT PASSENGER BUILDINGS FOR THE 21st CENTURY R. de Neufville, SB, SM, PhD, M.ASCE, M... deregulation in 1978 indicates that the design of airport passenger buildings is a key to the ... |
|||
|
Source: Massachusetts Institute of Technology (MIT),Department of Civil and Environmental Engineering, Airport Systems Planning, Design, and Management |
|||
|
Collection: Engineering ; Energy Storage, Conversion and Utilization |
|||
| 50 | Survivability Analysis of Networked Systems # Computer Sciences Department | ||
|
Summary: of Wisconsin Madison, WI 53706. email: jha@cs.wisc.edu Jeannette M. Wing School of Computer Science Carnegie... that a waiting customer leaves with his/her order is 0.5 [a=1,p=0.5] [a=1,p=0.5] [a=2,p=0.75] [a=2,p=0.75] ... |
|||
|
Source: Jha, Somesh - Department of Computer Sciences, University of Wisconsin at Madison |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 51 | Survivability Analysis of Networked Systems Computer Sciences Department | ||
|
Summary: of Wisconsin Madison, WI 53706. email: jha@cs.wisc.edu Jeannette M. Wing School of Computer Science Carnegie... that a waiting customer leaves with his/her order is 0.5 [a=1,p=0.5] [a=1,p=0.5] [a=2,p=0.75] [a=2,p=0.75] ... |
|||
|
Source: Jha, Somesh - Department of Computer Sciences, University of Wisconsin at Madison |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 52 | Report of the Department of Art Strategic Plan 2005 -2009 | ||
|
Summary: facilities to the M-wing; consolidate all painting to K and L-wings; relocate art education to D102... . Promote a "building aesthetic" that defines the function and purpose of programs in the department... the building. Clean-up and better utilize the courtyards located throughout the building. Increase ... |
|||
|
Source: Colorado State University, Center for Environmental Management of Military Lands (CEMML) |
|||
|
Collection: Environmental Management and Restoration Technologies |
|||
| 53 | REV. 2-15-02 PROJECT DESCRIPTION | ||
|
Summary: . GENERAL 1.01 DESCRIPTION OF WORK A. 1. a) B. C. 1.02 PART 2. MATERIALS 2.01 PART 3. EXECUTION 3.01 ***END... /28/02 SECTION TITLE PART 1. GENERAL 1.01 A. 1. a) B. C. 1.02 REFERENCES PART 2. MATERIALS 2.01 2.02 PART 3... : «BuildingName» BUILDING ... |
|||
|
Source: Becker, Luann - Institute for Crustal Studies, University of California at Santa Barbara |
|||
|
Collection: Geosciences |
|||
| 54 | Automated Generation and Analysis of Attack Graphs | ||
|
Summary: .Lippmann**, J. M. Wing * *CMU, ** MIT Lincoln Laboratories, ***U. Wisconsin Presented by: Maria Calle |
|||
|
Source: Kabara, Joseph - School of Information Sciences, University of Pittsburgh |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 55 | Appears in the Proceedings of the First International IEEE Security in Storage Workshop, December 2002 Verifiable Secret Redistribution for Archive Systems | ||
|
Summary: ,n) P , we select an m - 1 degree polynomial a(x) with constant term k and random coefficients a1 ... am... -1 Zp, and use a(x) to generate si for each i: si = k + a1i + . . . + am-1im-1 (2) To reconstruct k... P, we broadcast wit- nesses to k and the coefficients a1 ... |
|||
|
Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab. |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 56 | Verifiable Secret Redistribution for Archive Systems Theodore M. Wong Chenxi Wang Jeannette M. Wing | ||
|
Summary: Verifiable Secret Redistribution for Archive Systems Theodore M. Wong Chenxi Wang Jeannette M. Wing... ,n) P , we select an m - 1 degree polynomial a(x) with constant term k and random coefficients a1 ... am... -1 Zp, and use a(x) to generate si for each i: si = k + ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 57 | MeCA: Distributed Certification Authority in Wireless Mesh Networks | ||
|
Summary: is based on (m - 1)-order polynomial f(i) = k + a1i + a2i2 + · · · + am-1im-1 , where a1, a2, · · · , am-1... . When f(i) = k + a1i + a2i2 + · · · + am-1im-1 is used to generate the secret shares, gk , ga1... Vi = (gk , ga1 , · · · , gam-1 ) instead of gk ... |
|||
|
Source: Bahk, Saewoong - School of Electrical Engineering and Computer Science, Seoul National University |
|||
|
Collection: Engineering |
|||
| 58 | Effective and Scalable Software Compatibility Testing Il-Chul Yoon, Alan Sussman, Atif Memon, Adam Porter | ||
|
Summary: ) Component Versions A A1 B B1, B2, B3 C C1, C2 D D1, D2, D3 E E1, E2, E3, E4 F F1, F2, F3, F4, F5 G G1 * + D... ; Union for XOR nodes and Cartesian product for AND nodes. For example, (A1,{B1,D1}) is one of 15 direct... , starting from the bottom node. For example, a configuration to test the direct depen- ... |
|||
|
Source: Memon, Atif M. - Department of Computer Science, University of Maryland at College Park |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 59 | The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 2011 IEEE MAY/JUNE 2011 | ||
|
Summary: A1 ... frame1 DOM ID Communication channels IC Network IN framen frame2 File system IF Network... 1 contain two concurrent threads, A1 and B1, execut- ing the simple protocol in which A1 sends... a message to B1, and B1 sends back an acknowledgment. Then let jAB1 be ... |
|||
|
Source: Datta, Anupam - School of Computer Science, Carnegie Mellon University; Kaynar, Dilsun Kirli - Computer Science Department, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 60 | LePUS3: An Object-Oriented Design Description Language Epameinondas Gasparis (1 | ||
|
Summary: of reusable object-oriented software. Boston: Addison-Wesley, 1995. [7] J.M. Wing. "A Specifier's Introduction... : a formal specification language designed to capture and convey the building- blocks of object... to be a tool-assisted process of discovering some of the building-blocks in the design of ... |
|||
|
Source: Eden, Amnon - Department of Computer Science, University of Essex |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 61 | NetQi: A Model checker for Anticipation Game Elie Bursztein | ||
|
Summary: :Vuln=>Compr=200 A:6:Patch slow:Vuln=>!Vuln=500 A:1:Patch fast:Vuln=>!Vuln=5000 |
|||
|
Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 62 | Backbone Fiber Example Building 100, Telecommunications Room 1A | ||
|
Summary: 20 1A- WA21 1A- WA22 1A- WA23 1A- WA24 Building 100, Telecommunication Room 1A SD SIEMON CO. A01 1A-1... J01 A02 1A-1J02 A03 1A-1J03 A04 1A-1J04 A05 1A-1J05 A06 ... |
|||
|
Source: Florida, University of - College of Engineering. Software and Analysis of Advanced Materials Processing Center |
|||
|
Collection: Computer Technologies and Information Sciences ; Materials Science |
|||
| 63 | Specification Matching of Software AMY MOORMANN ZAREMSKI | ||
|
Summary: M. WING Carnegie Mellon University Specification matching is a way to compare two software... Corporation, 800 Phillips Road, 128-51E, Webster, NY 14580; email: zaremski@wrc.xerox.com; J. M. Wing, School... the following assumptions: 334 · Amy Moormann Zaremski and Jeannette M. ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 64 | Texas AgriLife Research Rule 51.06.99.A1 Naming of Buildings & Other Entities Page 1 of 2 Texas AgriLife Research Rules | ||
|
Summary: Texas AgriLife Research Rule 51.06.99.A1 Naming of Buildings & Other Entities Page 1 of 2 Texas... AgriLife Research Rules 51.06.99.A1 NAMING OF BUILDINGS & OTHER ENTITIES Approved: April 30, 2010 Next... ;Texas AgriLife Research Rule ... |
|||
|
Source: Texas A&M University, Spatial Sciences Laboratory |
|||
|
Collection: Geosciences |
|||
| 65 | Lecture 9: Heapsort Priority Queues | ||
|
Summary: )], which is an almost-heap · An example: A[1..10] = {4, 1, 7, 9, 3, 10, 14, 8, 2, 16} Build into a heap... . · The ideas: Build the array into a heap (WC cost (n)) The first key A[1] is the maximum and thus should... algorithm using heaps. · The ideas: ... |
|||
|
Source: Kondrak, Greg - Department of Computing Science, University of Alberta |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 66 | Towards an Algebra for Security Policies (Extended Abstract) | ||
|
Summary: Towards an Algebra for Security Policies (Extended Abstract) Jon Pincus1 and Jeannette M. Wing2 1... rendering component, these two settings interact in the case of HTML email. #12;20 J. Pincus and J.M. Wing... in both cases, regardless of whether we are reading or forwarding email: #12;22 J. Pincus and ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 67 | Automated architectural component classification using concept lattices Nour Alhouda Aboud, Gabriela Arevalo, Jean-Remy Falleri, Marianne Huchard, Chouki Tibermacine | ||
|
Summary: Agenda Concept_9 a3 e IMuseumAgenda Concept_4 r3 d3 ITouristicRoute Concept_7 a1 ITouristicAgenda Figure 5... r4 r5 d1 d2 d3 du b a1 a2 a3 e s IPubTranspRoute × × × × ITouristicRoute × × IMuseum... . 25, no. 5, pp. 4552, 2008. [8] A. M. Zaremski and J. M. ... |
|||
|
Source: Ecole Polytechnique, Centre de mathématiques |
|||
|
Collection: Mathematics |
|||
| 68 | A Rule-Based Approach to Producing Z Specifications from Jackson | ||
|
Summary: of COMPSAC'96, Seoul, 1996, pp. 254 260. 30. J.M. Wing, ``A study of 12 specifications of the library problem... ,'' IEEE Software Z . Z .July , 66 76 1988 . Z .31. J.M. Wing, ``A specifier's introduction to formal... processes are added and connected to the Z .model processes e.g., Book in Fig. 4 to ... |
|||
|
Source: Lee, Jonathan - Department of Computer Science and Information Engineering, National Central University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 69 | Encoding the satisfiability of modal and description logics into SAT: the case study of K(m)/ALC | ||
|
Summary: and properties of Km. Given a non-empty set of prim- itive propositions A = {A1,A2,...} and a set of m modal... boolean atom (i.e., A = {A1}) [5]; if we impose a bound on the modal depth of the Km-formulas, the prob... 2SAT() := A[1, ] Def(1, ), (1) Def(, Ai), := (2) ... |
|||
|
Source: Sebastiani, Roberto - Dipartimento di Ingegneria e Scienza dell'Informazione, Università di Trento |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 70 | Formal Aspects of Computing (1998) 10: 5975 c 1998 BCS Formal Aspects | ||
|
Summary: Interface Specifications Gary T. Leavens1 and Jeannette M. Wing2 1 Department of Computer Science, Iowa... , Iowa State University, Ames, IA 50011, USA. #12;60 G. T. Leavens and J. M. Wing int factorial(int x... . M. Wing fact: int -> int fact(i) == if i = 0 then 1 ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 71 | IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 4, NO. 20, APRIL 1994, PP. 259274 Using Term Rewriting to Verify Software | ||
|
Summary: 1 Consider the following program with while statement w and postcondition R: m := a[1]; i := 2; w... : while i n loop if m < a[i] then m := a[i]; end if; i := i + 1; end loop; R : {m = max(a[1..n])} where... max(a[1..n]) is the largest value in the set ... |
|||
|
Source: Antoy, Sergio - Department of Computer Science, Portland State University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 72 | IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 4, NO. 20, APRIL 1994, PP. 259* Using Term Rewriting to Verify Software* | ||
|
Summary: program with while statement w and postcondition R: m := a[1]; i := 2; w : while... ; R : fm = max(a[1::n])g where max(a[1::n]) is the largest value in the set fa[1]; : :;:a[n]g. #12... (n + 1; a; max(a[i::n]; m)) ... |
|||
|
Source: Antoy, Sergio - Department of Computer Science, Portland State University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 73 | Writing Larch Interface Language Specifications | ||
|
Summary: Writing Larch Interface Language Specifications JEANNETTE M. WING Carnegie-Mellon University... and Systems, Vol. 9, No. 1, January 1987,Pages l-24. #12;2 l Jeannette M. Wing documenting design decisions... ;4 ' Jeannette M. Wing approach, one gives a method of ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 74 | Biophysical Journal Volume 69 December 1995 2661-2669 Hydration of the DNA Bases Is Local | ||
|
Summary: their least-square fit by the program BMF (in A). 1The site was not observed in Schneider et al. (1993). tive... . Geometry of hydration. J. Mol. Bio. 151:535-556. Drew, H. R., R. M. Wing, T. Takano, C. Broka, S. Tanaka, K... of a particular type was then used to create a "hydrat- ed ... |
|||
|
Source: Schneider, Bohdan - Institute of Biotechnology (Prague) |
|||
|
Collection: Biotechnology ; Materials Science |
|||
| 75 | Integrated Design and Process Technology, IDPT-2003 Printed in the United States of America, June, 2003 | ||
|
Summary: to the CLI to indicate contract violations. S m(A1 a1, ..., An an) { S result; // extra variable to hold... 2000 Companion, pages 105-106, 2000. 17. B. H. Liskov and J. M. Wing. A Behavioral Notion of Subtyping... . Liskov and J. M. ... |
|||
|
Source: Abramson, David - Caulfield School of Information Technology, Monash University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 76 | Lightweight Object Specification with Typestates Kevin Bierhoff | ||
|
Summary: . 1. Before a method is executed, build a product e2 = (o, a1, . . . , an) to represent the receiver... A B e2 A e1 e2 B T-Apply ei Ai (e1, . . . , el) A1 × . . . × Al T-Prod A B1 A B2 A B1 B2 R... A1 B ... |
|||
|
Source: Aldrich, Jonathan - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 77 | SeminarsandColloquia IICUpdateInItIatIveInInnovatIveCompUtIngatHarvard,200910 | ||
|
Summary: Informatics, The Ohio State University Apr 28, 2010 Computational Thinking Jeannette M.Wing, Assistant... -Smithsonian Center for Astrophysics Mar 8, 2010 Bridging Neuroscience and GPU Computing to Build General Purpose |
|||
|
Source: Wolfe, Patrick J. - Electrical Engineering and Computer Science, School of Engineering and Applied Sciences, Harvard University |
|||
|
Collection: Engineering |
|||
| 78 | More About TAS and IsaWin ---Tools for Formal Program Development | ||
|
Summary: , a universal development environment for formal methods. In J. M. Wing, J. Woodcock, and J. Davies, editors, FM... to the TACAS conference [5]. What's New? The new features build on the strengths of TAS and Isa |
|||
|
Source: Lüth, Christoph - Deutschen Forschungszentrum für Künstliche Intelligenz & Fachbereich 3 - Mathematik und Informatik, Universität Bremen |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 79 | Lazy Behavioral Subtyping Johan Dovland, Einar Broch Johnsen, Olaf Owe, and Martin Steffen | ||
|
Summary: University, Ames, Iowa, 2006. 8. B. H. Liskov and J. M. Wing. A behavioral notion of subtyping. ACM... of the proposed analysis strategy. The talk builds on previously published work by the authors [5], but extends |
|||
|
Source: Steffen, Martin - Institutt for Informatikk, Universitetet i Oslo |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 80 | Vol. 0, No. 0, Z Vol. 0, No. 0, Z | ||
|
Summary: , Z, pages 199, http://www.jot.fm/issues/issues Z / #12;[WWD99] Jeannette M. Wing, Jim Woodcock... and some solutions for using componentware for building critical systems. The high quality development |
|||
|
Source: Jurjens, Jan - Fakultät für Elektrotechnik und Informationstechnik, Universität Dortmund |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 81 | Usable Verification: Balancing Thinking and Automating Jeannette M. Wing | ||
|
Summary: 1 Usable Verification: Balancing Thinking and Automating Jeannette M. Wing Computer... all developers in a company build with security and privacy in mind will (I hope) become more common |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 82 | Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts | ||
|
Summary: by many correlation methods. The left side of Fig. 2 shows a sequence of alerts ascending in time, a0, a1... ,. . ., an. For each i = 1, 2,. . ., n, the approach searches a0, a1,. . ., ai-1 for those ajs that sat- isfy... can be optimized with an index on a0, a1,. . ... |
|||
|
Source: Wang, Lingyu - Institute for Information Systems Engineering, Concordia University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 83 | A 3-approximation algorithm for computing a parsimonious first speciation in the gene duplication model | ||
|
Summary: (F) such that s A B anthe d t A B, A1 is the set of labels of edges (s, t) in H(F) such that s A - B and t A B... of L(F) such that: (1) a A1 AC and a AB C1 BC B1 or (2) a B1 BC and a AB C1 AC A1... . and x is necessarily a node which is not ... |
|||
|
Source: Ecole Polytechnique, Centre de mathématiques |
|||
|
Collection: Mathematics |
|||
| 84 | A 3-approximation algorithm for computing a parsimonious first speciation in the gene duplication model | ||
|
Summary: , A1 is the set of labels of edges (s, t) in H(F) such that s A - B and t A B, B1 is the set... (F) such that: (1) a A1 AC and a AB C1 BC B1 or (2) a B1 BC and a AB C1 AC A1. and x... is necessarily a node which is not an apparent ... |
|||
|
Source: Chauve, Cedric - Department of Mathematics, Simon Fraser University |
|||
|
Collection: Mathematics |
|||
| 85 | The University of Edinburgh | ||
|
Summary: A7 A70 A1 A720 City Bypass A702 KB Airport EDINBURGH A8 A68 Straiton A701 A71 M8 Pentland Hills (old... 's Buildings Liberton Brae Liberton Drive West Mains Road A772 West side: SMC incl IMNS(fabrication) 00 00 00... and Electronics (Alrick Building) Bell Building) Bldg) (John Muir ... |
|||
|
Source: Edinburgh, University of - Division of Informatics, Institute for Adaptive and Neural Computation |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 86 | To Sports Centre Callow Hill | ||
|
Summary: knaBtsewtaN a1yrellaGerutciP Sports Centre & Fields 46 Student Administration Centre 4 Students' Union... 9 40 3 Sports fields 51 To Sports Centre by car Callow Hill Non-accessible Buildings Facilities... incorporating College Bookshop 4 Electron Microscopy Unit 37 Enterprise Centre, Orchard Building 24 ... |
|||
|
Source: Sheldon, Nathan D. - Department of Geological Sciences, University of Michigan |
|||
|
Collection: Geosciences |
|||
| 87 | Using Belief to Reason About Cache Coherence L. Mummert, J.M. Wing, and M. Satyanarayanan | ||
|
Summary: Using Belief to Reason About Cache Coherence Abstract L. Mummert, J.M. Wing, and M. Satyanarayanan... Projects Agency (Hanscom A1r Force Base underConrract F19628-93-C-0193, ARPA Order No. A700; and the Wright... , A. Modet, and J.M. Wing. Larch: Languages and Tools ... |
|||
|
Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 88 | This article appeared in Functional Programming, Concurrency, Simulation and Automated Reasoning, Peter E. Lauer (Ed.), SpringerVerlag Lecture Notes in Computer Science, Vol. | ||
|
Summary: . 1990. [12] J.V. Guttag and J.J. Horning (eds.) with S.J. Garland, K.D. Jones, A. Modet, and J.M. Wing... . Programming Concepts and Methods, Tiberias, Apr. 1990. NorthHolland. [16] U. Martin and J.M. Wing. Proc... and Computer Science, MIT, TR MIT/LCS/TR299, May 1983. [21] J.M. ... |
|||
|
Source: Garland, Stephen J. - Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology (MIT) |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 89 | Respectful Type Converters For Mutable Types Jeannette M. Wing John Ockerbloom | ||
|
Summary: Respectful Type Converters For Mutable Types Jeannette M. Wing John Ockerbloom June 1999 CMU-CS-99... type hierarchy. T is a supertype of both A and B. Then there exist ancestor types, A1 :::An, between... A and T such that there exist the following abstraction functions: 0 : A ! ... |
|||
|
Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 90 | Liveness-Preserving Atomicity Abstraction Alexey Gotsman and Hongseok Yang | ||
|
Summary: of linearizability to libraries as follows. Definition 2. For libraries A1 and A2 with sig(A1) = sig(A2) we say... that A2 lin- earizes A1, written A1 A2, if H1 history( A1 ). H2 ... |
|||
|
Source: Gotsman, Alexey - Madrid Institute for Advanced Studies in Software Development Technologies (IMDEA Software Institute) |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 91 | Veterinary School RiverKelvin | ||
|
Summary: A1 Byre, The V11 Campbell Building - Food Farm V7 Cancer Research UK Building (Beatson Institute) B6... T MaryhillRoad MaryhillRoad ToCanniesburnToll To City Centre V2 V25 H1 A1 K1 A1 K1 V3 KV5 V6 V8 V7 V24 V9 V13... ... |
|||
|
Source: Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh |
|||
|
Collection: Physics ; Biology and Medicine |
|||
| 92 | No. III.A.1.e. RECOMMENDED ACTION Approval of Lease Agreement between the Board of Governors | ||
|
Summary: No. III.A.1.e. RECOMMENDED ACTION Approval of Lease Agreement between the Board of Governors... . Boonville Avenue, Springfield, Missouri described as buildings #1, #2, #3, #4, and #5 and WHEREAS... , Springfield Innovation, Inc., (tenant) desires to lease building #4 and be granted the right to demolish ... |
|||
|
Source: Rebaza, Jorge - Department of Mathematics, Missouri State University |
|||
|
Collection: Mathematics |
|||
| 93 | Liveness-preserving atomicity abstraction Alexey Gotsman1 | ||
|
Summary: as follows. Definition 2. For libraries A1 and A2 with sig(A1) = sig(A2) we say that A2 lin- earizes A1... , written A1 A2, if H1 history( A1 ). H2 history( A2 ). H1 H2. Thus, A2 ... |
|||
|
Source: Yang, Hongseok - Department of Computer Science, Queen Mary, University of London |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 94 | Model Checking Probabilistic Distributed Benedikt Bollig1 | ||
|
Summary: and the set of infinite words over , respectively. Furthermore, let = be the set of words. For a word = a1... infinitely often in . For a word = a1 . . . an and a natural i {1, . . . , n+1}, we accordingly define i... to be the word with a1 . . . ai-1 = ... |
|||
|
Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification; Leucker, Martin - Institut für Informatik, Technische Universität München |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 95 | I N F O R M A T I K Universitat | ||
|
Summary: be defined by q p(a4) p(a3) p(a2) p(a1) p(a0) and let N be the following set of ground clauses: q q p(a1) q... p(a1) ¬p(a3) p(a2) p(a0) p(a3) p(a1) p(a0) p(a2) ¬p(a1) ... |
|||
|
Source: Waldmann, Uwe - Max-Planck-Institut für Informatik |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 96 | Heapsort and Priority Queues Suggested reading: Chapter 6 | ||
|
Summary: Heapify(A, largest) Running time: O(log n). 2 #12;3 Build a heap Problem: Convert an array A[1..n] of integers... into a max-heap. procedure Build-Max-Heap(A[1..n]) heap-size[A] n for i parent(n) downto 1 do Max... ..n]) Build-Max-Heap(A[1..n]) ... |
|||
|
Source: Lai, Ten-Hwang "Steve" - Department of Computer Science and Engineering, Ohio State University |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 97 | Service selection by choreography-driven Matteo Baldoni, Cristina Baroglio, Alberto Martelli, | ||
|
Summary: . The execution trace can either be linear, i.e. a terminating sequence a1, . . . , an of atomic actions... obtaining as answer the successful sequence of actions = a1; a2; . . . ; an, which is an execution trace... of p.2 We denote by the sequence of actions a0; ... |
|||
|
Source: Torino, Università di - Dipartimento di Informatica, Logic Programming and Automated Reasoning Group |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 98 | Abstract --This article sets forth a design optimization methodology for an SMPM machine drive on an operating | ||
|
Summary: frequency 2 kHz Bias voltage for IGBT (diode) per ampere-rating 2341 V.A-1 1800 V.A-1 Dynamic resistance... for IGBT (diode) per ampere-rating 1500 m.A-1 1200 m.A-1 Switching loss coefficient 3 ... |
|||
|
Source: Ecole Polytechnique, Centre de mathématiques |
|||
|
Collection: Mathematics |
|||
| 99 | Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing | ||
|
Summary: Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing October 2001 CMUCS01... , . . . , n}: 1. Compute the shares s i for secret k using a polynomial a(x) = k+a 1 i+. . .+am-1 i m-1... , and distribute the shares to the corresponding i # P over private channels. 2. Send g k and g ... |
|||
|
Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.; Carnegie Mellon University, School of Computer Science |
|||
|
Collection: Computer Technologies and Information Sciences |
|||
| 100 | Arnold Schwarzenegger INDOOR-OUTDOOR AIR LEAKAGE | ||
|
Summary: ) 18 (7) Restaurant 4 (1) 1 (0) 2 (1) 7 (3) Lodging 5 (2) 2 (1) 7 (3) N/A 1 (0) 3 (1) 4 (1) Total 136... Arnold Schwarzenegger Governor INDOOR-OUTDOOR AIR LEAKAGE OF APARTMENTS AND COMMERCIAL BUILDINGS... ) performed the literature search to identify publications containing data on apartment building ... |
|||
|
Source: California Energy Commission |
|||
|
Collection: Energy Storage, Conversion and Utilization |
|||