標題: Titlebook: SOFSEM 2001: Theory and Practice of Informatics; 28th Conference on C Leszek Pacholski,Peter Ru?i?ka Conference proceedings 2001 Springer-V [打印本頁] 作者: 指責 時間: 2025-3-21 19:59
書目名稱SOFSEM 2001: Theory and Practice of Informatics影響因子(影響力)
書目名稱SOFSEM 2001: Theory and Practice of Informatics影響因子(影響力)學科排名
書目名稱SOFSEM 2001: Theory and Practice of Informatics網絡公開度
書目名稱SOFSEM 2001: Theory and Practice of Informatics網絡公開度學科排名
書目名稱SOFSEM 2001: Theory and Practice of Informatics被引頻次
書目名稱SOFSEM 2001: Theory and Practice of Informatics被引頻次學科排名
書目名稱SOFSEM 2001: Theory and Practice of Informatics年度引用
書目名稱SOFSEM 2001: Theory and Practice of Informatics年度引用學科排名
書目名稱SOFSEM 2001: Theory and Practice of Informatics讀者反饋
書目名稱SOFSEM 2001: Theory and Practice of Informatics讀者反饋學科排名
作者: gangrene 時間: 2025-3-21 21:37
Hamideh Afsarmanesh,Ersin Kaletas,Louis O. Hertzberger作者: 千篇一律 時間: 2025-3-22 01:35 作者: innovation 時間: 2025-3-22 07:11 作者: Charlatan 時間: 2025-3-22 11:06 作者: Acumen 時間: 2025-3-22 13:14
Recent Advances in Wavelength Routingse of symmetric communication. We also survey various techniques that have been developed recently, and explain how they can be used to attack the problem. First, we give the main ideas of deterministic greedy algorithms and study their limitations. Then, we show how to use various ways and models o作者: neutrophils 時間: 2025-3-22 20:17 作者: Limerick 時間: 2025-3-22 22:19 作者: Phonophobia 時間: 2025-3-23 02:28
ADST: An Order Preserving Scalable Distributed Data Structure with Constant Access Costs queries featured by order preserving techniques (e.g., RP* and DRT). Furthermore, recent proposals for ensuring high-availability to an SDDS can be easily combined with our basic technique. Therefore our solution is a theoretical achievement potentially attractive for network servers requiring both作者: 條街道往前推 時間: 2025-3-23 06:18 作者: innovation 時間: 2025-3-23 13:17
Conference proceedings 2001 well-known spa Pie?stany, Slovak Republic. This was the 28th annual conference in the SOFSEM series organized either in the Slovak or the Czech Republic. SOFSEM has a well-established tradition. Currently it is a broad, multid- ciplinary conference, devoted to the theory and practice of software sy作者: jettison 時間: 2025-3-23 16:23
Negotiating the Semantic Gap: From Feature Maps to Semantic Landscapesword can then retrieve documents perhaps not containing this keyword, but containing other keywords from the same cluster. In this paper, we examine the use of this technique for content-based web document retrieval, using both keywords and image features to represent the documents.作者: anachronistic 時間: 2025-3-23 19:08
How Can Computer Science Contribute to Knowledge Discoverylain some random sampling techniques for speeding up learning algorithms and making them applicable to large data sets [15], [16], [4], [3]. We also show some algorithms obtained by using these techniques.作者: Macronutrients 時間: 2025-3-23 22:46 作者: 搜集 時間: 2025-3-24 03:39 作者: 無政府主義者 時間: 2025-3-24 07:12
Approximative Learning of Regular Languages of these language classes. Moreover, we show that all regular languages can be approximated in the setting introduced by Kobayashi and Yokomori [., [.]. Finally, we prove that the class of all function-distinguishable languages is equal to the class of regular languages.作者: 征兵 時間: 2025-3-24 12:28
The Potential of Grid, Virtual Laboratories and Virtual Organizations for Bio-sciencesand devices. In this paper, the general design of the VLAM-G platform is introduced. Furthermore, the application of the VLAM-G and its extension with Virtual Organization concepts for specific scientific domains is presented, with focus on bio-sciences.作者: 賞錢 時間: 2025-3-24 17:12 作者: 無底 時間: 2025-3-24 19:10
Model Checking Communication Protocolstocols by verifying properties such as well-formedness and absence of deadlock. Our method is based on a representation of communicating finite-state machines in terms of logic programs. This leads to efficient verification algorithms based on the ground and non-ground semantics of logic programming.作者: 神圣在玷污 時間: 2025-3-25 03:05 作者: 保存 時間: 2025-3-25 04:42
Knowledge-Based Control Systemstrol system design are also discussed. Two case studies are described which illustrate the variety of problems and approaches: one for control of flooding in a city, the other for control of an anaerobic waste treatment plant.作者: FLORA 時間: 2025-3-25 11:01 作者: 憤怒歷史 時間: 2025-3-25 13:26
Formal Verification Methods for Industrial Hardware Designpacity limits of existing FV tools and the availability of trained personnel. The application of FV to industrial designs is an active research area with huge opportunities for academic and industrial researchers.作者: 我不死扛 時間: 2025-3-25 18:18 作者: 鍵琴 時間: 2025-3-25 21:09
Agreement Problems in Fault-Tolerant Distributed Systemsroadcast, Group Membership which are different versions of this paradigmunderly much of existing fault-tolerant distributed systems. We describe these problems, explain their relationships, and state some fundamental results on their solvability, depending on the system model. We then review and com作者: 船員 時間: 2025-3-26 02:46
Negotiating the Semantic Gap: From Feature Maps to Semantic Landscapesweb document retrieval. This work concerns a technique, latent semantic indexing (LSI), which has been used for textual information retrieval for many years. In this environment, LSI determines clusters of co-occurring keywords, sometimes, called concepts, so that a query which uses a particular key作者: Grasping 時間: 2025-3-26 05:19 作者: Omniscient 時間: 2025-3-26 12:09 作者: Osteoarthritis 時間: 2025-3-26 14:37 作者: Sciatica 時間: 2025-3-26 19:04
Knowledge-Based Control Systemsem is intrinsically knowledge-intensive, benefiting from awareness of the behaviour and interactions of components. There are complexities such as time constraints, partial and qualitative information, and in many cases there is a need for a degree of human understandability in performance. In this 作者: Orgasm 時間: 2025-3-27 00:08
Beyond the Turing Limit: Evolving Interactive Systemsctionality may change over time as components enter or disappear. Also, as a rule their components interact with each other and with the environment at unpredictable times and in unpredictable manners, and they evolve in ways that are not pre-programmed. Finally, although the life span of the indivi作者: Infirm 時間: 2025-3-27 05:10
Formal Verification Methods for Industrial Hardware Designquent software releases; however, fixing hardware bugs in any shipped product is expensive. Simulation remains the dominate functional validation method, but in the last decade, formal verification (FV) has emerged as an important complementary method. We describe basic FV methods: theorem proving, 作者: immunity 時間: 2025-3-27 05:42
How Can Computer Science Contribute to Knowledge Discoveryields including computer science. Good softwares have been demanded for various knowledge discovery tasks. For such softwares, we often need to develop efficient algorithms for handling huge data sets. . is one of the important algorithmic methods for processing huge data sets. In this paper, we exp作者: fastness 時間: 2025-3-27 09:54
Model Checking Communication Protocolseveral different communication protocols can be specified with this simple model. In this paper we address the problem of automatically validating protocols by verifying properties such as well-formedness and absence of deadlock. Our method is based on a representation of communicating finite-state 作者: vector 時間: 2025-3-27 15:46
Pipelined Decomposable BSP Computers computations. We prove that a modification of the bulk synchronous parallel (BSP) machine model, called decomposable BSP (dBSP), belongs to the class of weak parallel machines if its computational power is restricted properly. We will also correct some earlier results about pipelined parallel Turin作者: 中和 時間: 2025-3-27 19:50 作者: 魅力 時間: 2025-3-28 00:30 作者: 開花期女 時間: 2025-3-28 04:36 作者: 預防注射 時間: 2025-3-28 06:32
ADST: An Order Preserving Scalable Distributed Data Structure with Constant Access Costsputing environment made up by a collection of computers connected through a high speed network. In this paper we propose an order preserving SDDS with a worst-case constant cost for exact-search queries and a worst-case logarithmic cost for update queries. Since our technique preserves the ordering 作者: 撕裂皮肉 時間: 2025-3-28 13:56
Approximative Learning of Regular Languagesave been exploited to design regular lan- guage classes called . -distinguishable which are identifiable in the limit from positive samples. Special cases of this approach are the . -reversible and terminal distinguishable languages as discussed in [., ., ., ., .].Here, we give new characterizations作者: hysterectomy 時間: 2025-3-28 15:58
978-3-540-42912-8Springer-Verlag Berlin Heidelberg 2001作者: 地牢 時間: 2025-3-28 20:04 作者: esoteric 時間: 2025-3-29 00:40
How to Employ Reverse Search in Distributed Single Source Shortest Pathsbasedon relaxations anduses reverse search for inspecting edges and thus avoids using any additional data structures. At the same time the algorithm uses a novel way to recognize a reachable negative-length cycle in the graph which facilitates the scalability of the algorithm.作者: 異教徒 時間: 2025-3-29 04:59
Distributed Computations by Autonomous Mobile RobotsMost of the concerns of Distributed Computing may appear in settings which are quite different from its traditonal applications ares such as distributed systems, data and communication networks, etc. An important setting of this type is the one of ..作者: 簡潔 時間: 2025-3-29 09:32
On the Approximability of Interactive Knapsack ProblemsWe show that the interactive knapsack heuristic optimization problem is APX-hard. Moreover, we discuss the relationship between the interactive knapsack heuristic optimization problem and some other knapsack problems.作者: 未開化 時間: 2025-3-29 13:15 作者: Flatter 時間: 2025-3-29 17:26 作者: Mhc-Molecule 時間: 2025-3-29 21:16
https://doi.org/10.1007/3-540-45627-9Algorithms; Biocomputing; Complexity; Discrete Mathematics; Distributed Systems; Formal Methods; Grid Comp作者: 商談 時間: 2025-3-30 03:20
Joachim Bumkedeutung im Wirtschaftsleben zu. Auch wenn der Mittelstand durch seine hohe Flexibilit?t sowie seine ausgepr?gte Kunden- und Serviceorientierung beeindruckt, sind gewisse Schw?chen wie der gr??enbedingte Ressourcenmangel vorhanden. Diese Schw?chen wiegen in Zeiten der Globalisierung und dem Trend zum作者: Handedness 時間: 2025-3-30 04:23 作者: 炸壞 時間: 2025-3-30 10:36
Employing mobile communities for marketing consumer goodsh either companies or customers themselves. Companies that are able to encourage their customers to interact stimulated by their branded products could position their product as a link between their customers and employ the developing communities for marketing purposes. To stimulate this kind of int作者: 形上升才刺激 時間: 2025-3-30 13:38 作者: Dictation 時間: 2025-3-30 19:25 作者: 做方舟 時間: 2025-3-30 21:39 作者: Madrigal 時間: 2025-3-31 02:21 作者: 六邊形 時間: 2025-3-31 08:17 作者: Cloudburst 時間: 2025-3-31 10:25
Web Servicestion integration requires tools that go one step beyond what conventional middleware and EAI platforms have achieved. Web services and the associated technology are being leveraged to take such a step.作者: 管理員 時間: 2025-3-31 13:55 作者: 水槽 時間: 2025-3-31 20:00
Nicolas Scellesrface. A conventional approach to calculation of shock layer flows consists in a successive solution of the inviscid gas and boundary layer equations. When the afore-mentioned effects become important, implementation of these models meets difficulties or even becomes impossible. In this case, one ha作者: COMMA 時間: 2025-4-1 00:59
Heavy Metal Accumulation and Health Risk Assessment in the Puddles of Virudhunagar District, Tamil Nt the levels of Cd (0.007?ppm) Cu (1.0?ppm), and Zn (15.00?ppm) in each water sample were within allowable limits. The build-up of Pb, Zn, Cu and Cd buildup in the gills, muscles, and bones of ., ., . and .. Pb levels were higher than permitted (0.29?ppm) in the muscle, bone, and gills of ., ., ., a作者: Incorruptible 時間: 2025-4-1 05:49 作者: Substance-Abuse 時間: 2025-4-1 09:33 作者: medium 時間: 2025-4-1 11:29 作者: Obsequious 時間: 2025-4-1 17:57