Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Topic List  Advanced Search  
Sample search results for: a-1 m-wing building

Page:   2  3  4  5 
 
1 Computational ThinkingComputational Thinking Jeannette M. Wing
 

Summary:  Computational ThinkingComputational Thinking Jeannette M. Wing President's Professor of Computer... Computational Thinking Jeannette M. Wing Paper off http://www.cs.cmu.edu/~wing/ #12;Computing... Jeannette M. Wing guided by the following concerns... #12;Measures of ...

  

Source: Reddy, Raj - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
2 The View from Carnegie Mellon: What We Did and What We're Doing
 

Summary:  and Information Technology, Pittsburgh, PA, November 17, 2005 Jeannette M. Wing President's Professor of Computer... Science Head, Computer Science Department Carnegie Mellon University #12;2NCWIT Jeannette M. Wing Carnegie... and Interdisciplinary #12;3NCWIT Jeannette M. ...

  

Source: Reddy, Raj - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
3 Software Security Jeannette M. Wing
 

Summary:  Software Security Jeannette M. Wing Computer Science Department Carnegie Mellon University... . References [1] M. Howard, J. Pincus, and J.M. Wing, "Measuring Relative Attack Surfaces," Proceedings... -169 Technical Report, August 2003. [2] P.K. Manadhata, J.M. Wing, ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
4 Software Engineering Institute Technical Report
 

Summary:  Specifying Functional and Timing Behavior for Real-Time Applications M.R. Barbacci J.M. Wing Approved... Force Avionics Laboratory Under Contract F33616-64-K-1520. Additional support for J.M. Wing was provided... ., are appreciated. Dr. Mario R. Barbacci Professor Jeannette M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
5 EMERGENCY RESPONSE PLAN TECHNOLOGICAL INSTITUTE BUILDING (TECH)
 

Summary:  Materials Alarm One group of labs in Tech ­ second floor M Wing M252, M260, M266, M277 ­ is equipped... EMERGENCY RESPONSE PLAN TECHNOLOGICAL INSTITUTE BUILDING (TECH) NORTHWESTERN UNIVERSITY Updated... July 22, 2010 The Technological Institute Building (Tech) at 2145 Sheridan Road, Evanston, IL 60208

  

Source: Grzybowski, Bartosz A. - Departments of Chemistry & Chemical and Biological Engineering, Northwestern University

 

Collection: Materials Science ; Chemistry

 
6 Proving Correctness of a Controller Algorithm for the RAID Level 5 System
 

Summary:  Lynch a Jeannette M. Wing March 1998 CMU­CS­98­117 a MIT Lab. for Computer Science, 545 Technology... building such a tool, our approach consists of studying several controller algorithms manually

  

Source: Carnegie Mellon University, School of Computer Science

 

Collection: Computer Technologies and Information Sciences

 
7 Formal Methods: State of the Art and Future Edmund M. Clarke and Jeannette M. Wing
 

Summary:  Formal Methods: State of the Art and Future Directions Edmund M. Clarke and Jeannette M. Wing... ­0481, or permissions@acm.org. #12; 2 \Delta E.M. Clarke and J.M. Wing About Programs---Mechanical verification... that allow us to handle #12; 6 \Delta E.M. Clarke and J.M. ...

  

Source: Carnegie Mellon University, School of Computer Science, Informedia Project; Clarke, Edmund M. - Department of Electrical and Computer Engineering, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
8 Developing Applications for Heterogeneous
 

Summary:  , Dennis L. Doubleday, Charles B. Weinstock, and Jeannette M. Wing Carnegie Mellon University ABSTRACT... commands to control motors and other 8 M.R. Barbacci, D. L. Doubleday, C. B. Weinstock, and J. M. Wing #12... M.R. Barbacci, D. L. Doubleday, C. B. Weinstock, and J. M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
9 Signature Matching: A Tool for Using Software Libraries
 

Summary:  Signature Matching: A Tool for Using Software Libraries AMY MOORMANN ZAREMSKI and JEANNETTE M. WING... Engineering and Methodology, VO1. 4, No. ~, April 1995 #12;148 . A. Moormann Zaremskl and J. M. Wing signature... of the argument to T is a.1 In general, when we 1We ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
10 Experience with the Larch Prover Jeannette M. Wing and Chun Gong
 

Summary:  Experience with the Larch Prover Jeannette M. Wing and Chun Gong School of Computer Science... - thesis,Kluwer, 1987. [5] D. L. Detlefs, M. P. Herlihy, and J. M. Wing. Inheritance of synchronization... -Verlag, 1979. [11] J.V. Guttag, J.J.Homing, and J.M. Wing. The ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
11 EMERGENCY RESPONSE PLAN Ford Motor Company Engineering Design Center (Ford)
 

Summary:  occupants are expected to learn building safety procedures and to follow the instructions of department... Company Engineering Design Center Building Safety Committee on June 8, 2006 with revision on August 19... and then follow appropriate protocol. The building alarm is an "intelligent" system which that every alarm device

  

Source: Chen, Wei - Department of Mechanical Engineering, Northwestern University; Grzybowski, Bartosz A. - Departments of Chemistry & Chemical and Biological Engineering, Northwestern University

 

Collection: Chemistry ; Engineering ; Materials Science

 
12 Mathematics in Computer Science School of Computer Science
 

Summary:  Pittsburgh, PA Jeannette M. Wing Sixth International Conference on Mathematics of Program Construction July... 2002, Dagstuhl, Germany #12;2Math in CS Curricula Jeannette M. Wing Prelude: Three Observations... to the undergraduate level. #12;3Math in CS Curricula Jeannette M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
13 58 January 2008/Vol. 51, No. 1 COMMUNICATIONS OF THE ACM FIVE DEEP QUESTIONS
 

Summary:  foundations and help engineer the systems we can only imagine. BY JEANNETTE M. WING 1 I thank Robert L... is intelligence? What is information?1 (How) can we build complex systems simply? There is nothing special about... the emergent behavior of multiple interacting systems. Can we build systems with simple ...

  

Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
14 Programming ELSEVIER Science of ComputerProgramming28 (1997) 273-299
 

Summary:  study in model checking software systems Jeannette M. Wing a,*, Mandana Vaziri-Farahani b,1 a Computer... machines. #12;J.M. Wing, M. Vaziri-Farahanil Science of Computer Programming 28 (1997) 273-299 275 We thus... 7. #12;276 J.M. Wing, M. Vaziri-FarahanilScience of ...

  

Source: Vaziri, Mandana - Program Analysis and Transformation Group, IBM T.J. Watson Research Center; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
15 INTRODUCTION Academia Sinica, Taiwan
 

Summary:  that rapidly respond when attacks commence. Michael Howard, Jon Pincus, and Jeannette M. Wing report on work... at the conference. The first section deals with the classical issue of cryptographic protocols. How can we build... security has been the change of emphasis from building impenetrable systems to ...

  

Source: Tygar, Doug - Department of Electrical Engineering and Computer Sciences, University of California at Berkeley

 

Collection: Computer Technologies and Information Sciences

 
16 re:Dress MSU MUSEUM EXHIBIT PUTS A `GREEN' TWIST ON FASHION DESIGN
 

Summary:  . "Students tackled the `green' aspects of the design with different strategies," explains Theresa M. Winge... artifacts and natural history specimens, with collections numbering more than 1 million in four buildings... , exhibitions, research and the building and stewardship of collections that focus on ...

  

Source: Liu, Taosheng - Department of Psychology, Michigan State University

 

Collection: Biology and Medicine

 
17 Reasoning About Atomic Objects Maurice P. Herllhy and Jeannette M. Wing
 

Summary:  Reasoning About Atomic Objects Maurice P. Herllhy and Jeannette M. Wing Computer Science Department... Carnegie Mellon University Pittsburgh, Pennsylvania 15213-3890 U.S.A. 1 Abstract Atomic transactions... . A history H is well-formed is it satisfies the following conditions for all transactions ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
18 COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 33 omputational thinking
 

Summary:  without understanding its every detail. It is LISAHANEY Viewpoint Jeannette M. Wing Computational Thinking... . Jeannette M. Wing (wing@cs.cmu.edu) is the President's Professor of Computer Science in and head... COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 33 C omputational thinking ...

  

Source: Carnegie Mellon University, School of Computer Science; Rosson, Mary Beth - College of Information Sciences and Technology, Pennsylvania State University; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
19 ANTICIPATING DYNAMIC LOADS IN HANDLING OBJECTS. Alan M. Wing
 

Summary:  1 ANTICIPATING DYNAMIC LOADS IN HANDLING OBJECTS. Alan M. Wing Sensory Motor Neuroscience Centre... , The University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK. a.m.wing@bham.ac.uk J. Randall Flanagan... in humans. In A.M. Wing, P. Haggard & J.R. Flanagan (Eds) Hand and Brain: ...

  

Source: Birmingham, University of - School of Psychology, Sensory Motor Neuroscience Centre; Flanagan, Randy - Departments of Psychology & Physiology, Queen's University (Kingston)

 

Collection: Biology and Medicine

 
20 Open Building List Winter 2011 Winter Quarter 2011 Jan 3rd
 

Summary:  CLASSES/RENOVATIONS 2/24/2011 Adventure Recreation Ctr (ARC) 855 Woody Hayes Dr. M-R 6a-1a F 6a-10p S 8a... -10p N 8a-1a Ag Admin (AA) 2120 Fyffe Rd. M 7a-7p T/W 7a-6:30p R/F 7a-5p RM 045 FAES M-W 8a-8p R-F 8a... entrance to request access. Drake Union 1849 Cannon Dr M-F ...

  

Source: Ohio State University, Department of Industrial, Welding, and Systems Engineering, Biodynamics Laboratories

 

Collection: Engineering ; Biology and Medicine


Page:   2  3  4  5 
Page:   1  2  3  4  5 
 
21 Kelvingrove Art Gallery
 

Summary:  Building 11 Eldon St Aerospace Engineering A1 - James Watt South Building Anderson College C1 Archaeology D... 11 Eldon St Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1... - Hetherington ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering

 

Collection: Engineering ; Biology and Medicine

 
22 Open Building List Spring 2011 Spring Quarter 2011 Mar 28th
 

Summary:  /8/2011 Adventure Recreation Ctr (ARC) 855 Woody Hayes Dr. M-R 6a-1a F 6a-10p S 8a-10p N 8a-1a Ag Admin (AA) 2120... -F 7a-1a S-N 10a-1a Dreese Lab (DL) 2015 Neil Avenue M/W 7a-730p T/R 7a-10p F 7a-530p Keycard: Aaron... (ST) ...

  

Source: Ohio State University, Department of Industrial, Welding, and Systems Engineering, Biodynamics Laboratories

 

Collection: Engineering ; Biology and Medicine

 
23 THE CENTRE FOR APPLIED LINGUISTICS INDUCTION MEETINGS OCTOBER 2011
 

Summary:  .00 Room A1.06 (First floor of social Sciences Building) MA IN ENGLISH LANGUAGE TEACHING MA IN ENGLISH... Social Sciences Building) MA IN ENGLISH LANGUAGE TEACHING & MULTIMEDIA MONDAY 3 OCTOBER 2.00 Room A1... Sciences Building) MSc in ...

  

Source: Goldschmidt, Christina - Department of Statistics, University of Warwick

 

Collection: Mathematics

 
24 University Avenue ChurchStreet
 

Summary:  St Aerospace Engineering A1 ­ James Watt South Building AMICUS E13 ­ 68 Oakfield Av Alexander Stone... Electronics & Electrical Engineering E7 ­ Rankine Building Engineering Faculty Office A1 ­ James Watt South... Building A2 James Watt ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering; Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh

 

Collection: Biology and Medicine ; Engineering ; Physics

 
25 Accommodation Services D14 -73 Great George Street Accounting & Finance E12 -65-73 Southpark Avenue
 

Summary:  Aerospace Engineering A1 - James Watt South Building AMICUS E13 - 68 Oakfield Avenue Anderson College C1... Office A1 - James Watt South Building English Language D15 - 12 University Gardens English Literature D15... Watt South Building ...

  

Source: St Andrews, University of - School of Mathematics and Statistics, Centre for Interdisciplinary Research in Computational Algebra

 

Collection: Mathematics

 
26 Kelvingrove Art Gallery
 

Summary:  Andrews Building Aerospace Engineering A1 - James Watt South Building AMICUS E13 - 68 Oakfield Avenue... Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1 - James Watt South... North ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering

 

Collection: Engineering ; Biology and Medicine

 
27 Presented at the 19th International Workshop on Security Protocols, Cambridge, UK, March 28-30, 2011 (to appear in LNCS, Springer Verlag)
 

Summary:  Virgil Gligor and Jeannette M. Wing Carnegie Mellon University Pittsburgh, Pennsylvania 15213 gligor... contents? We need to 1 #12;2 Virgil Gligor and Jeannette M. Wing trust the person who wrote the page... failures, it uses insurance-based recovery mechanisms. #12;4 Virgil Gligor and Jeannette ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
28 Towards a Theory of Trust in Networks of Humans and Computers
 

Summary:  Towards a Theory of Trust in Networks of Humans and Computers Virgil Gligor and Jeannette M. Wing... to #12;2 Virgil Gligor and Jeannette M. Wing trust the person who wrote the page, the computer that hosts... failures, it uses insurance-based recovery mechanisms. #12;4 Virgil Gligor and Jeannette ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
29 Open Building List Summer 2011 Summer Quarter 2011 June 20th
 

Summary:  Street M-F 7a-midngt S 9a-1a N 10a-midngt #12;BUILDING DAY HOURS LIBRARY HOURS LAB HOURS COMMENT CLASSES... B&M Wings M-F 6a-6p A Wing M-F 7a-5p #12;BUILDING DAY HOURS LIBRARY HOURS LAB HOURS COMMENT CLASSES... ) 855 Woody Hayes Dr. M-R ...

  

Source: Jones, Michelle - Department of Horticulture and Crop Science, Ohio State University

 

Collection: Biology and Medicine

 
30 Kelvingrove Art Gallery
 

Summary:  Adult & Continuing Education E14 - St Andrews Building 11 Eldon Street Aerospace Engineering A1 - James... Street Electronics & Electrical Engineering E7 - Rankine Building Engineering Faculty Office A1 - James... James Watt South ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering

 

Collection: Engineering ; Biology and Medicine

 
31 University Avenue ChurchStreet
 

Summary:  & Continuing E14 ­ St Andrew's Education Building, 11 Eldon St Aerospace Engineering A1 ­ James Watt South... ­ St Andrew's Building, 11 Eldon St Electronics & Electrical Engineering, School of A1 ­ James Watt... ­ Maths Building ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering; Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh

 

Collection: Biology and Medicine ; Engineering ; Physics

 
32 Unintrusive Ways to Integrate Formal Specifications in Jeannette M. Wing and Amy Moormann Zaremski
 

Summary:  Unintrusive Ways to Integrate Formal Specifications in Practice Jeannette M. Wing and Amy Moormann... such as the one in Figure 9. Let us build up to a trait that describes well-formed instance pictures by beginning... Picture Trait insert arrow(move all boxes(pic delta) a) Next we define a trait that builds ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
33 Int J Softw Tools Technol Transfer (2003) 4: 261265 / Digital Object Identifier (DOI) 10.1007/s10009-002-0105-2 The opinion corner
 

Summary:  10009-002-0105-2 The opinion corner Platitudes and attitudes Jeannette M. Wing School of Computer... about the increase in complexity of a system. #12;262 J.M. Wing: Platitudes and attitudes... con- sider the science and the engineering ingenuity needed to #12;264 J.M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
34 Lecture 8: Building Heaps Max-Heapify
 

Summary:  #12;Lecture 8: Building Heaps Heaps data structure (recall): · An array A[1..n] of n comparable keys... [j] · There are max-heap and min-heap. We use max-heap. · A[1] is the maximum among the n keys. · Viewing heap... an array: · Given: an array of n keys ...

  

Source: Kondrak, Greg - Department of Computing Science, University of Alberta

 

Collection: Computer Technologies and Information Sciences

 
35 TOWARDS A SCIENCE OF SURVIVABILITY: A Research Agenda and a Specific Method
 

Summary:  1 TOWARDS A SCIENCE OF SURVIVABILITY: A Research Agenda and a Specific Method Jeannette M. Wing... Institute, CMU/SEI-97-TR-013, November 1997, revised May 1999. [JWLL00] Somesh Jha, Jeannette M. Wing... . Phase One We build a scenario graph representing the sequences of states and events ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
36 Technical Report CMU/SEI-89-TR-034
 

Summary:  Manual (Version 2) Mario R. Barbacci Jeannette M. Wing September 1989 #12;Technical Report CMU/SEI-89-TR... ) Mario R. Barbacci Jeannette M. Wing Software for Heterogeneous Machines Project Unlimited distribution... /SEI-89-TR-34 #12;List of Tables Table A-1: Axioms ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
37 Formal Methods: State of the Art and Future Edmund M. Clarke and Jeannette M. Wing
 

Summary:  Formal Methods: State of the Art and Future Directions Edmund M. Clarke and Jeannette M. Wing... ) the feasibility of building a formal model of a system that is readable and reviewable by application experts... checking is a technique that relies on building a finite model of a system and checking that a ...

  

Source: Carnegie Mellon University, School of Computer Science

 

Collection: Computer Technologies and Information Sciences

 
38 A Symbiotic Relationship Between Formal Methods and Security
 

Summary:  A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing December 1998 CMU... . In particular for a system to be certified A.1 according to the Orange Book means that one formally specify... proving tools. To get one's system certified A.1, one ...

  

Source: Carnegie Mellon University, School of Computer Science

 

Collection: Computer Technologies and Information Sciences

 
39 A Symbiotic Relationship Between Formal Methods and Security
 

Summary:  A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing December 1998 CMU... security requirements in Government contracts. In particular for a system to be certi ed A.1 according... in the development of theorem proving tools. To get one's system certi ed ...

  

Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
40 A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing"
 

Summary:  A Symbiotic Relationship Between Formal Methods and Security Jeannette M. Wing" School of Computer... in Government contracts. In particular for a system to be certified A.1 according to the Orange Book means... in the development of theorem proving tools. To get one's system certified ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
41 Automatic Discovery of Mutual Exclusion Algorithms (Preliminary Version)
 

Summary:  a[0] = me 3 a[me] = 1 4 while a[1] = next 5 a[me] = 0 6 endwhile 7 endwhile 8 critical section 9 a... endwhile 6 critical section 7 a[me] = 0 1 a[me] = 1 2 b[me] = me 3 a[1] = 0 4 a[me] = a[0] 5 while b... [next] != a[1] 6 endwhile 7 critical section 8 b[me] = next ...

  

Source: Taubenfeld, Gadi - School of Computer Science, Interdisciplinary Center Herzliya

 

Collection: Computer Technologies and Information Sciences

 
42 T-SEll 5/2//25084 Extending lna Jo with Temporal Logic
 

Summary:  T-SEll 5/2//25084 Extending lna Jo with Temporal Logic Jeannette M. Wing Mark R. Nixon Reprinted... Corporation. In ad- currently available to state concurrency requirements. dition, J. M. Wing was supported... of with System Development Corporation, Santa Monica, CA 90406. J. M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
43 The University of Glasgow, charity number SC004401 Bicycle parking available at Public use Department only
 

Summary:  Map Key A1 James Watt Building (South) A3 Thomson Building A4 Pearce Lodge A10 Gilbert Scott Building... Street Wellington Church U A1 A3 A4 A9 A7 A10 A12 A20 E9 B1B10 E6 E10 E4 B2 E8E7 B8 B3 B7 B6 B4 B4 B4 C7 C10 C2 C1 C... Department only Adam ...

  

Source: Glasgow, University of - Department of Mechanical Engineering, Centre for Rehabilitation Engineering

 

Collection: Engineering ; Biology and Medicine

 
44 Liveness-Preserving Atomicity Abstraction Alexey Gotsman and Hongseok Yang
 

Summary:  lift the notion of linearizability to libraries as follows. Definition 2. For libraries A1 and A2... with sig(A1) = sig(A2) we say that A2 lin- earizes A1, written A1 A2, if H1 history( ...

  

Source: Oxford, University of - Computing Laboratory, Quantitative Analysis and Verification Group

 

Collection: Computer Technologies and Information Sciences

 
45 Week 2: DFA and NFA 1. Exercise 2.2.1
 

Summary:  ) 4. Suppose = {a, b, c}. Build a DFA A1 that accepts exactly the words containing ac as a subword... should occur in between. Represent this constraint L1 as a DFA A1. Suppose that there is another... . Represent the constraint L2 as a DFA A2. Do the product construction of ...

  

Source: Coquand, Thierry - Department of Computer Science and Engineering, Chalmers University of Technology

 

Collection: Computer Technologies and Information Sciences

 
46 Computational thinking and thinking about computing
 

Summary:  Computational thinking and thinking about computing BY JEANNETTE M. WING* Computer Science... and molecular computers, as well (cf. §2a). J. M. Wing3718 Phil. Trans. R. Soc. A (2008) #12;communication... , it is worth revisiting this question again, with a specific focus on earlier years. J. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
47 Lazy In nite-State Analysis of Security David Basin
 

Summary:  )) | Says a b (Crypt b1 (Pair (Agent a1) (Nonce na) )) <- t, a == a1, b == b1, Says _ a' (Crypt a1' (Pair... (Nonce na') (Nonce nb))) <-t, a == a', a' == a1', na == na'] attacker t = [Says Spy a msg | a <- [Alice... 1 ...

  

Source: Basin, David - Departement Informatik, Eidgenössische Technische Hochschule Zürich (ETHZ)

 

Collection: Computer Technologies and Information Sciences

 
48 Hints to Speci ers Jeannette M. Wing
 

Summary:  Hints to Speci ers Jeannette M. Wing May 22, 1995 CMU-CS-95-118r School of Computer Science... . Suppose is a state transition relation, : State Action ! 2State Then an example of choice is: (s a1) = ftg... (s a2) = fug which says from state s you can either do the action ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
49 DESIGNING AIRPORT PASSENGER BUILDINGS FOR THE 21st CENTURY
 

Summary:  will produce a new generation of super jumbo aircraft, with 90m. wing spans, and able to carry about 800... DESIGNING AIRPORT PASSENGER BUILDINGS FOR THE 21st CENTURY R. de Neufville, SB, SM, PhD, M.ASCE, M... deregulation in 1978 indicates that the design of airport passenger buildings is a key to the ...

  

Source: Massachusetts Institute of Technology (MIT),Department of Civil and Environmental Engineering, Airport Systems Planning, Design, and Management

 

Collection: Engineering ; Energy Storage, Conversion and Utilization

 
50 Survivability Analysis of Networked Systems # Computer Sciences Department
 

Summary:  of Wisconsin Madison, WI 53706. email: jha@cs.wisc.edu Jeannette M. Wing School of Computer Science Carnegie... that a waiting customer leaves with his/her order is 0.5 [a=1,p=0.5] [a=1,p=0.5] [a=2,p=0.75] [a=2,p=0.75] ...

  

Source: Jha, Somesh - Department of Computer Sciences, University of Wisconsin at Madison

 

Collection: Computer Technologies and Information Sciences

 
51 Survivability Analysis of Networked Systems Computer Sciences Department
 

Summary:  of Wisconsin Madison, WI 53706. email: jha@cs.wisc.edu Jeannette M. Wing School of Computer Science Carnegie... that a waiting customer leaves with his/her order is 0.5 [a=1,p=0.5] [a=1,p=0.5] [a=2,p=0.75] [a=2,p=0.75] ...

  

Source: Jha, Somesh - Department of Computer Sciences, University of Wisconsin at Madison

 

Collection: Computer Technologies and Information Sciences

 
52 Report of the Department of Art Strategic Plan 2005 -2009
 

Summary:  facilities to the M-wing; consolidate all painting to K and L-wings; relocate art education to D102... . Promote a "building aesthetic" that defines the function and purpose of programs in the department... the building. Clean-up and better utilize the courtyards located throughout the building. Increase ...

  

Source: Colorado State University, Center for Environmental Management of Military Lands (CEMML)

 

Collection: Environmental Management and Restoration Technologies

 
53 REV. 2-15-02 PROJECT DESCRIPTION
 

Summary:  . GENERAL 1.01 DESCRIPTION OF WORK A. 1. a) B. C. 1.02 PART 2. MATERIALS 2.01 PART 3. EXECUTION 3.01 ***END... /28/02 SECTION TITLE PART 1. GENERAL 1.01 A. 1. a) B. C. 1.02 REFERENCES PART 2. MATERIALS 2.01 2.02 PART 3... : «BuildingName»­ BUILDING ...

  

Source: Becker, Luann - Institute for Crustal Studies, University of California at Santa Barbara

 

Collection: Geosciences

 
54 Automated Generation and Analysis of Attack Graphs
 

Summary:  .Lippmann**, J. M. Wing * *CMU, ** MIT Lincoln Laboratories, ***U. Wisconsin Presented by: Maria Calle

  

Source: Kabara, Joseph - School of Information Sciences, University of Pittsburgh

 

Collection: Computer Technologies and Information Sciences

 
55 Appears in the Proceedings of the First International IEEE Security in Storage Workshop, December 2002 Verifiable Secret Redistribution for Archive Systems
 

Summary:  ,n) P , we select an m - 1 degree polynomial a(x) with constant term k and random coefficients a1 ... am... -1 Zp, and use a(x) to generate si for each i: si = k + a1i + . . . + am-1im-1 (2) To reconstruct k... P, we broadcast wit- nesses to k and the coefficients a1 ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.

 

Collection: Computer Technologies and Information Sciences

 
56 Verifiable Secret Redistribution for Archive Systems Theodore M. Wong Chenxi Wang Jeannette M. Wing
 

Summary:  Verifiable Secret Redistribution for Archive Systems Theodore M. Wong Chenxi Wang Jeannette M. Wing... ,n) P , we select an m - 1 degree polynomial a(x) with constant term k and random coefficients a1 ... am... -1 Zp, and use a(x) to generate si for each i: si = k + ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
57 MeCA: Distributed Certification Authority in Wireless Mesh Networks
 

Summary:  is based on (m - 1)-order polynomial f(i) = k + a1i + a2i2 + · · · + am-1im-1 , where a1, a2, · · · , am-1... . When f(i) = k + a1i + a2i2 + · · · + am-1im-1 is used to generate the secret shares, gk , ga1... Vi = (gk , ga1 , · · · , gam-1 ) instead of gk ...

  

Source: Bahk, Saewoong - School of Electrical Engineering and Computer Science, Seoul National University

 

Collection: Engineering

 
58 Effective and Scalable Software Compatibility Testing Il-Chul Yoon, Alan Sussman, Atif Memon, Adam Porter
 

Summary:  ) Component Versions A A1 B B1, B2, B3 C C1, C2 D D1, D2, D3 E E1, E2, E3, E4 F F1, F2, F3, F4, F5 G G1 * + D... ; Union for XOR nodes and Cartesian product for AND nodes. For example, (A1,{B1,D1}) is one of 15 direct... , starting from the bottom node. For example, a configuration to test the direct depen- ...

  

Source: Memon, Atif M. - Department of Computer Science, University of Maryland at College Park

 

Collection: Computer Technologies and Information Sciences

 
59 The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 2011 IEEE MAY/JUNE 2011
 

Summary:  A1 ... frame1 DOM ID Communication channels IC Network IN framen frame2 File system IF Network... 1 contain two concurrent threads, A1 and B1, execut- ing the simple protocol in which A1 sends... a message to B1, and B1 sends back an acknowledgment. Then let jAB1 be ...

  

Source: Datta, Anupam - School of Computer Science, Carnegie Mellon University; Kaynar, Dilsun Kirli - Computer Science Department, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
60 LePUS3: An Object-Oriented Design Description Language Epameinondas Gasparis (1
 

Summary:  of reusable object-oriented software. Boston: Addison-Wesley, 1995. [7] J.M. Wing. "A Specifier's Introduction... : a formal specification language designed to capture and convey the building- blocks of object... to be a tool-assisted process of discovering some of the building-blocks in the design of ...

  

Source: Eden, Amnon - Department of Computer Science, University of Essex

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
61 NetQi: A Model checker for Anticipation Game Elie Bursztein
 

Summary:  :Vuln=>Compr=200 A:6:Patch slow:Vuln=>!Vuln=500 A:1:Patch fast:Vuln=>!Vuln=5000 1=42 M. Wing... is used to build and display the game file and ...

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification

 

Collection: Computer Technologies and Information Sciences

 
62 Backbone Fiber Example Building 100, Telecommunications Room 1A
 

Summary:  20 1A- WA21 1A- WA22 1A- WA23 1A- WA24 Building 100, Telecommunication Room 1A SD SIEMON CO. A01 1A-1... J01 A02 1A-1J02 A03 1A-1J03 A04 1A-1J04 A05 1A-1J05 A06 ...

  

Source: Florida, University of - College of Engineering. Software and Analysis of Advanced Materials Processing Center

 

Collection: Computer Technologies and Information Sciences ; Materials Science

 
63 Specification Matching of Software AMY MOORMANN ZAREMSKI
 

Summary:  M. WING Carnegie Mellon University Specification matching is a way to compare two software... Corporation, 800 Phillips Road, 128-51E, Webster, NY 14580; email: zaremski@wrc.xerox.com; J. M. Wing, School... the following assumptions: 334 · Amy Moormann Zaremski and Jeannette M. ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
64 Texas AgriLife Research Rule 51.06.99.A1 Naming of Buildings & Other Entities Page 1 of 2 Texas AgriLife Research Rules
 

Summary:  Texas AgriLife Research Rule 51.06.99.A1 Naming of Buildings & Other Entities Page 1 of 2 Texas... AgriLife Research Rules 51.06.99.A1 NAMING OF BUILDINGS & OTHER ENTITIES Approved: April 30, 2010 Next... ;Texas AgriLife Research Rule ...

  

Source: Texas A&M University, Spatial Sciences Laboratory

 

Collection: Geosciences

 
65 Lecture 9: Heapsort Priority Queues
 

Summary:  )], which is an almost-heap · An example: A[1..10] = {4, 1, 7, 9, 3, 10, 14, 8, 2, 16} Build into a heap... . · The ideas: ­ Build the array into a heap (WC cost (n)) ­ The first key A[1] is the maximum and thus should... algorithm using heaps. · The ideas: ­ ...

  

Source: Kondrak, Greg - Department of Computing Science, University of Alberta

 

Collection: Computer Technologies and Information Sciences

 
66 Towards an Algebra for Security Policies (Extended Abstract)
 

Summary:  Towards an Algebra for Security Policies (Extended Abstract) Jon Pincus1 and Jeannette M. Wing2 1... rendering component, these two settings interact in the case of HTML email. #12;20 J. Pincus and J.M. Wing... in both cases, regardless of whether we are reading or forwarding email: #12;22 J. Pincus and ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
67 Automated architectural component classification using concept lattices Nour Alhouda Aboud, Gabriela Arevalo, Jean-Remy Falleri, Marianne Huchard, Chouki Tibermacine
 

Summary:  Agenda Concept_9 a3 e IMuseumAgenda Concept_4 r3 d3 ITouristicRoute Concept_7 a1 ITouristicAgenda Figure 5... r4 r5 d1 d2 d3 du b a1 a2 a3 e s IPubTranspRoute × × × × ITouristicRoute × × IMuseum... . 25, no. 5, pp. 45­52, 2008. [8] A. M. Zaremski and J. M. ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
68 A Rule-Based Approach to Producing Z Specifications from Jackson
 

Summary:  of COMPSAC'96, Seoul, 1996, pp. 254 260. 30. J.M. Wing, ``A study of 12 specifications of the library problem... ,'' IEEE Software Z . Z .July , 66 76 1988 . Z .31. J.M. Wing, ``A specifier's introduction to formal... processes are added and connected to the Z .model processes e.g., Book in Fig. 4 to ...

  

Source: Lee, Jonathan - Department of Computer Science and Information Engineering, National Central University

 

Collection: Computer Technologies and Information Sciences

 
69 Encoding the satisfiability of modal and description logics into SAT: the case study of K(m)/ALC
 

Summary:  and properties of Km. Given a non-empty set of prim- itive propositions A = {A1,A2,...} and a set of m modal... boolean atom (i.e., A = {A1}) [5]; if we impose a bound on the modal depth of the Km-formulas, the prob... 2SAT() := A[1, ] Def(1, ), (1) Def(, Ai), := (2) ...

  

Source: Sebastiani, Roberto - Dipartimento di Ingegneria e Scienza dell'Informazione, Università di Trento

 

Collection: Computer Technologies and Information Sciences

 
70 Formal Aspects of Computing (1998) 10: 5975 c 1998 BCS Formal Aspects
 

Summary:  Interface Specifications Gary T. Leavens1 and Jeannette M. Wing2 1 Department of Computer Science, Iowa... , Iowa State University, Ames, IA 50011, USA. #12;60 G. T. Leavens and J. M. Wing int factorial(int x... . M. Wing fact: int -> int fact(i) == if i = 0 then 1 ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
71 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 4, NO. 20, APRIL 1994, PP. 259274 Using Term Rewriting to Verify Software
 

Summary:  1 Consider the following program with while statement w and postcondition R: m := a[1]; i := 2; w... : while i n loop if m < a[i] then m := a[i]; end if; i := i + 1; end loop; R : {m = max(a[1..n])} where... max(a[1..n]) is the largest value in the set ...

  

Source: Antoy, Sergio - Department of Computer Science, Portland State University

 

Collection: Computer Technologies and Information Sciences

 
72 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 4, NO. 20, APRIL 1994, PP. 259* Using Term Rewriting to Verify Software*
 

Summary:  program with while statement w and postcondition R: m := a[1]; i := 2; w : while... ; R : fm = max(a[1::n])g where max(a[1::n]) is the largest value in the set fa[1]; : :;:a[n]g. #12... (n + 1; a; max(a[i::n]; m)) ...

  

Source: Antoy, Sergio - Department of Computer Science, Portland State University

 

Collection: Computer Technologies and Information Sciences

 
73 Writing Larch Interface Language Specifications
 

Summary:  Writing Larch Interface Language Specifications JEANNETTE M. WING Carnegie-Mellon University... and Systems, Vol. 9, No. 1, January 1987,Pages l-24. #12;2 l Jeannette M. Wing documenting design decisions... ;4 ' Jeannette M. Wing approach, one gives a method of ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
74 Biophysical Journal Volume 69 December 1995 2661-2669 Hydration of the DNA Bases Is Local
 

Summary:  their least-square fit by the program BMF (in A). 1The site was not observed in Schneider et al. (1993). tive... . Geometry of hydration. J. Mol. Bio. 151:535-556. Drew, H. R., R. M. Wing, T. Takano, C. Broka, S. Tanaka, K... of a particular type was then used to create a "hydrat- ed ...

  

Source: Schneider, Bohdan - Institute of Biotechnology (Prague)

 

Collection: Biotechnology ; Materials Science

 
75 Integrated Design and Process Technology, IDPT-2003 Printed in the United States of America, June, 2003
 

Summary:  to the CLI to indicate contract violations. S m(A1 a1, ..., An an) { S result; // extra variable to hold... 2000 Companion, pages 105-106, 2000. 17. B. H. Liskov and J. M. Wing. A Behavioral Notion of Subtyping... . Liskov and J. M. ...

  

Source: Abramson, David - Caulfield School of Information Technology, Monash University

 

Collection: Computer Technologies and Information Sciences

 
76 Lightweight Object Specification with Typestates Kevin Bierhoff
 

Summary:  . 1. Before a method is executed, build a product e2 = (o, a1, . . . , an) to represent the receiver... A B e2 A e1 e2 B T-Apply ei Ai (e1, . . . , el) A1 × . . . × Al T-Prod A B1 A B2 A B1 B2 R... A1 B ...

  

Source: Aldrich, Jonathan - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
77 SeminarsandColloquia IICUpdateInItIatIveInInnovatIveCompUtIngatHarvard,200910
 

Summary:  Informatics, The Ohio State University Apr 28, 2010 Computational Thinking Jeannette M.Wing, Assistant... -Smithsonian Center for Astrophysics Mar 8, 2010 Bridging Neuroscience and GPU Computing to Build General Purpose

  

Source: Wolfe, Patrick J. - Electrical Engineering and Computer Science, School of Engineering and Applied Sciences, Harvard University

 

Collection: Engineering

 
78 More About TAS and IsaWin ---Tools for Formal Program Development
 

Summary:  , a universal development environment for formal methods. In J. M. Wing, J. Woodcock, and J. Davies, editors, FM... to the TACAS conference [5]. What's New? The new features build on the strengths of TAS and Isa

  

Source: Lüth, Christoph - Deutschen Forschungszentrum für Künstliche Intelligenz & Fachbereich 3 - Mathematik und Informatik, Universität Bremen

 

Collection: Computer Technologies and Information Sciences

 
79 Lazy Behavioral Subtyping Johan Dovland, Einar Broch Johnsen, Olaf Owe, and Martin Steffen
 

Summary:  University, Ames, Iowa, 2006. 8. B. H. Liskov and J. M. Wing. A behavioral notion of subtyping. ACM... of the proposed analysis strategy. The talk builds on previously published work by the authors [5], but extends

  

Source: Steffen, Martin - Institutt for Informatikk, Universitetet i Oslo

 

Collection: Computer Technologies and Information Sciences

 
80 Vol. 0, No. 0, Z Vol. 0, No. 0, Z
 

Summary:  , Z, pages 1­99, http://www.jot.fm/issues/issues Z / #12;[WWD99] Jeannette M. Wing, Jim Woodcock... and some solutions for using componentware for building critical systems. The high quality development

  

Source: Jurjens, Jan - Fakultät für Elektrotechnik und Informationstechnik, Universität Dortmund

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
81 Usable Verification: Balancing Thinking and Automating Jeannette M. Wing
 

Summary:  1 Usable Verification: Balancing Thinking and Automating Jeannette M. Wing Computer... all developers in a company build with security and privacy in mind will (I hope) become more common

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
82 Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
 

Summary:  by many correlation methods. The left side of Fig. 2 shows a sequence of alerts ascending in time, a0, a1... ,. . ., an. For each i = 1, 2,. . ., n, the approach searches a0, a1,. . ., ai-1 for those ajs that sat- isfy... can be optimized with an index on a0, a1,. . ...

  

Source: Wang, Lingyu - Institute for Information Systems Engineering, Concordia University

 

Collection: Computer Technologies and Information Sciences

 
83 A 3-approximation algorithm for computing a parsimonious first speciation in the gene duplication model
 

Summary:  (F) such that s A B anthe d t A B, ­ A1 is the set of labels of edges (s, t) in H(F) such that s A - B and t A B... of L(F) such that: ­ (1) a A1 AC and a AB C1 BC B1 or ­ (2) a B1 BC and a AB C1 AC A1... . and x is necessarily a node which is not ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
84 A 3-approximation algorithm for computing a parsimonious first speciation in the gene duplication model
 

Summary:  , ­ A1 is the set of labels of edges (s, t) in H(F) such that s A - B and t A B, ­ B1 is the set... (F) such that: ­ (1) a A1 AC and a AB C1 BC B1 or ­ (2) a B1 BC and a AB C1 AC A1. and x... is necessarily a node which is not an apparent ...

  

Source: Chauve, Cedric - Department of Mathematics, Simon Fraser University

 

Collection: Mathematics

 
85 The University of Edinburgh
 

Summary:  A7 A70 A1 A720 City Bypass A702 KB Airport EDINBURGH A8 A68 Straiton A701 A71 M8 Pentland Hills (old... 's Buildings Liberton Brae Liberton Drive West Mains Road A772 West side: SMC incl IMNS(fabrication) 00 00 00... and Electronics (Alrick Building) Bell Building) Bldg) (John Muir ...

  

Source: Edinburgh, University of - Division of Informatics, Institute for Adaptive and Neural Computation

 

Collection: Computer Technologies and Information Sciences

 
86 To Sports Centre Callow Hill
 

Summary:  knaBtsewtaN a1yrellaGerutciP Sports Centre & Fields 46 Student Administration Centre 4 Students' Union... 9 40 3 Sports fields 51 To Sports Centre by car Callow Hill Non-accessible Buildings Facilities... incorporating College Bookshop 4 Electron Microscopy Unit 37 Enterprise Centre, Orchard Building 24 ...

  

Source: Sheldon, Nathan D. - Department of Geological Sciences, University of Michigan

 

Collection: Geosciences

 
87 Using Belief to Reason About Cache Coherence L. Mummert, J.M. Wing, and M. Satyanarayanan
 

Summary:  Using Belief to Reason About Cache Coherence Abstract L. Mummert, J.M. Wing, and M. Satyanarayanan... Projects Agency (Hanscom A1r Force Base underConrract F19628-93-C-0193, ARPA Order No. A700; and the Wright... , A. Modet, and J.M. Wing. Larch: Languages and Tools ...

  

Source: Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
88 This article appeared in Functional Programming, Concurrency, Simulation and Automated Reasoning, Peter E. Lauer (Ed.), SpringerVerlag Lecture Notes in Computer Science, Vol.
 

Summary:  . 1990. [12] J.V. Guttag and J.J. Horning (eds.) with S.J. Garland, K.D. Jones, A. Modet, and J.M. Wing... . Programming Concepts and Methods, Tiberias, Apr. 1990. North­Holland. [16] U. Martin and J.M. Wing. Proc... and Computer Science, MIT, TR MIT/LCS/TR­299, May 1983. [21] J.M. ...

  

Source: Garland, Stephen J. - Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology (MIT)

 

Collection: Computer Technologies and Information Sciences

 
89 Respectful Type Converters For Mutable Types Jeannette M. Wing John Ockerbloom
 

Summary:  Respectful Type Converters For Mutable Types Jeannette M. Wing John Ockerbloom June 1999 CMU-CS-99... type hierarchy. T is a supertype of both A and B. Then there exist ancestor types, A1 :::An, between... A and T such that there exist the following abstraction functions: 0 : A ! ...

  

Source: Carnegie Mellon University, School of Computer Science; Wing, Jeannette M. - School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
90 Liveness-Preserving Atomicity Abstraction Alexey Gotsman and Hongseok Yang
 

Summary:  of linearizability to libraries as follows. Definition 2. For libraries A1 and A2 with sig(A1) = sig(A2) we say... that A2 lin- earizes A1, written A1 A2, if H1 history( A1 ). H2 ...

  

Source: Gotsman, Alexey - Madrid Institute for Advanced Studies in Software Development Technologies (IMDEA Software Institute)

 

Collection: Computer Technologies and Information Sciences

 
91 Veterinary School RiverKelvin
 

Summary:  A1 Byre, The V11 Campbell Building - Food Farm V7 Cancer Research UK Building (Beatson Institute) B6... T MaryhillRoad MaryhillRoad ToCanniesburnToll To City Centre V2 V25 H1 A1 K1 A1 K1 V3 KV5 V6 V8 V7 V24 V9 V13... ...

  

Source: Swain, Peter - Centre for Systems Biology at Edinburgh, University of Edinburgh

 

Collection: Physics ; Biology and Medicine

 
92 No. III.A.1.e. RECOMMENDED ACTION Approval of Lease Agreement between the Board of Governors
 

Summary:  No. III.A.1.e. RECOMMENDED ACTION ­ Approval of Lease Agreement between the Board of Governors... . Boonville Avenue, Springfield, Missouri described as buildings #1, #2, #3, #4, and #5 and WHEREAS... , Springfield Innovation, Inc., (tenant) desires to lease building #4 and be granted the right to demolish ...

  

Source: Rebaza, Jorge - Department of Mathematics, Missouri State University

 

Collection: Mathematics

 
93 Liveness-preserving atomicity abstraction Alexey Gotsman1
 

Summary:  as follows. Definition 2. For libraries A1 and A2 with sig(A1) = sig(A2) we say that A2 lin- earizes A1... , written A1 A2, if H1 history( A1 ). H2 history( A2 ). H1 H2. Thus, A2 ...

  

Source: Yang, Hongseok - Department of Computer Science, Queen Mary, University of London

 

Collection: Computer Technologies and Information Sciences

 
94 Model Checking Probabilistic Distributed Benedikt Bollig1
 

Summary:  and the set of infinite words over , respectively. Furthermore, let = be the set of words. For a word = a1... infinitely often in . For a word = a1 . . . an and a natural i {1, . . . , n+1}, we accordingly define i... to be the word with a1 . . . ai-1 = ...

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification; Leucker, Martin - Institut für Informatik, Technische Universität München

 

Collection: Computer Technologies and Information Sciences

 
95 I N F O R M A T I K Universitat
 

Summary:  be defined by q p(a4) p(a3) p(a2) p(a1) p(a0) and let N be the following set of ground clauses: q q p(a1) q... p(a1) ¬p(a3) p(a2) p(a0) p(a3) p(a1) p(a0) p(a2) ¬p(a1) ...

  

Source: Waldmann, Uwe - Max-Planck-Institut für Informatik

 

Collection: Computer Technologies and Information Sciences

 
96 Heapsort and Priority Queues Suggested reading: Chapter 6
 

Summary:  Heapify(A, largest) Running time: O(log n). 2 #12;3 Build a heap Problem: Convert an array A[1..n] of integers... into a max-heap. procedure Build-Max-Heap(A[1..n]) heap-size[A] n for i parent(n) downto 1 do Max... ..n]) Build-Max-Heap(A[1..n]) ...

  

Source: Lai, Ten-Hwang "Steve" - Department of Computer Science and Engineering, Ohio State University

 

Collection: Computer Technologies and Information Sciences

 
97 Service selection by choreography-driven Matteo Baldoni, Cristina Baroglio, Alberto Martelli,
 

Summary:  . The execution trace can either be linear, i.e. a terminating sequence a1, . . . , an of atomic actions... obtaining as answer the successful sequence of actions = a1; a2; . . . ; an, which is an execution trace... of p.2 We denote by the sequence of actions a0; ...

  

Source: Torino, Università di - Dipartimento di Informatica, Logic Programming and Automated Reasoning Group

 

Collection: Computer Technologies and Information Sciences

 
98 Abstract --This article sets forth a design optimization methodology for an SMPM machine drive on an operating
 

Summary:  frequency 2 kHz Bias voltage for IGBT (diode) per ampere-rating 2341 V.A-1 1800 V.A-1 Dynamic resistance... for IGBT (diode) per ampere-rating 1500 m.A-1 1200 m.A-1 Switching loss coefficient 3 ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
99 Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing
 

Summary:  Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing October 2001 CMU­CS­01... , . . . , n}: 1. Compute the shares s i for secret k using a polynomial a(x) = k+a 1 i+. . .+am-1 i m-1... , and distribute the shares to the corresponding i # P over private channels. 2. Send g k and g ...

  

Source: Carnegie Mellon University, Department of Electrical and Computer Engineering, Parallel Data Lab.; Carnegie Mellon University, School of Computer Science

 

Collection: Computer Technologies and Information Sciences

 
100 Arnold Schwarzenegger INDOOR-OUTDOOR AIR LEAKAGE
 

Summary:  ) 18 (7) Restaurant 4 (1) 1 (0) 2 (1) 7 (3) Lodging 5 (2) 2 (1) 7 (3) N/A 1 (0) 3 (1) 4 (1) Total 136... Arnold Schwarzenegger Governor INDOOR-OUTDOOR AIR LEAKAGE OF APARTMENTS AND COMMERCIAL BUILDINGS... ) performed the literature search to identify publications containing data on apartment building ...

  

Source: California Energy Commission

 

Collection: Energy Storage, Conversion and Utilization


Page:   1  2  3  4  5