• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,619
Next 10 →

Translating Colored Control Flow Nets into Readable Java via Annotated Java Workflow Nets

by Kristian Bisgaard Lassen, Simon Tjell
"... Abstract. In this paper, we present a method for developing Java applications from Colored Control Flow Nets (CCFNs), which is a special kind of Colored Petri Nets (CPNs) that we introduce. CCFN makes an explicit distinction between the representation of: The system, the environment of the system, a ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract. In this paper, we present a method for developing Java applications from Colored Control Flow Nets (CCFNs), which is a special kind of Colored Petri Nets (CPNs) that we introduce. CCFN makes an explicit distinction between the representation of: The system, the environment of the system

An integrative theory of prefrontal cortex function.

by Earl K Miller , Jonathan D Cohen - Annual Review of Neuroscience, , 2001
"... Abstract The prefrontal cortex has long been suspected to play an important role in cognitive control, in the ability to orchestrate thought and action in accordance with internal goals. Its neural basis, however, has remained a mystery. Here, we propose that cognitive control stems from the active ..."
Abstract - Cited by 1093 (20 self) - Add to MetaCart
the active maintenance of patterns of activity in the prefrontal cortex that represent goals and the means to achieve them. They provide bias signals to other brain structures whose net effect is to guide the flow of activity along neural pathways that establish the proper mappings between inputs, internal

Managerial Discretion and Optimal Financing Policies

by Renc M. Stulz - J. Finan. Econ , 1990
"... I analyze financing policies in a firm owned by atomistic shareholders who observe neither cash flows nor management’s investment decisions. Management derives perquisites from investment and invests as much as possible. Since it always claims that cash flow is too low to fund all positive net prese ..."
Abstract - Cited by 453 (18 self) - Add to MetaCart
I analyze financing policies in a firm owned by atomistic shareholders who observe neither cash flows nor management’s investment decisions. Management derives perquisites from investment and invests as much as possible. Since it always claims that cash flow is too low to fund all positive net

Petrify: a tool for manipulating concurrent specifications and . . .

by Jordi Cortadella, et al.
"... Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original descripti ..."
Abstract - Cited by 219 (34 self) - Add to MetaCart
Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original

NetScope: Traffic Engineering for IP Networks

by Anja Feldmann, Albert Greenberg, Carsten Lund, Nick Reingold, Jennifer Rexford - IEEE NETWORK MAGAZINE , 2000
"... Managing large IP networks requires an understanding of the current traffic ows, routing policies, and network configuration. Yet, the state-of-the-art for managing IP networks involves manual con guration of each IP router, and traffic engineering based on limited measurements. The networking indus ..."
Abstract - Cited by 147 (35 self) - Add to MetaCart
-wide implications of local changes in traffic, con guration, and control. Using NetScope, a network provider can experiment with changes in network configuration in a simulated environment, rather than the operational network. In addition, the tool provides a sound framework for additional modules for network

Optimizing Multi-Feature Queries for Image Databases

by Ulrich Güntzer, Wolf-Tilo Balke, Werner Kießling , 2000
"... In digital libraries image retrieval queries can be based on the similarity of objects, using several feature attributes like shape, texture, color or text. Such multi-feature queries return a ranked result set instead of exact matches. Besides, the user wants to see only the k top-ranked objec ..."
Abstract - Cited by 184 (18 self) - Add to MetaCart
queries. Compared to Fagin's algorithm we have developed an improved termination condition in tuned combination with a heuristic control flow adopting itself narrowly to the particular score distribution. Top-ranked results can be computed and output incrementally. We show that we can

Workflow ControlFlow Patterns: A Revised View

by Nick Russell, Arthur H. M. Ter Hofstede, Nataliya Mulyar , 2006
"... The Workflow Patterns Initiative was established with the aim of delineating the fundamental requirements that arise during business process modelling on a recurring basis and describe them in an imperative way. The first deliverable of this research project was a set of twenty patterns describing t ..."
Abstract - Cited by 123 (17 self) - Add to MetaCart
patterns and provides a formal description of each of them in the form of a Coloured Petri-Net (CPN) model. It also identifies twenty three new patterns relevant to the control-flow perspective. Detailed context conditions and evaluation criteria are presented for each pattern and their implementation

Towards a Pattern Language for Colored Petri Nets

by Nataliya Mulyar, Wil M.P. van der Aalst , 2005
"... Experienced Petri net modelers model in terms of patterns, just like object-oriented programmers use the design patterns of Gamma et al. So far there is no any structured collection of patterns for Colored Petri Nets. We have empirically collected 34 patterns in Colored Petri Nets and documented ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
and documented them in the pattern format. The patterns focus on the interplay between data-flow and control-flow, (i.e. the essence of Colored Petri Nets), and have been modeled using CPN Tools. The goal of the patterns is to assist and train inexperienced modelers, and to serve as a domain language

Time domain passivity control of haptic interfaces

by Blake Hannaford - IEEE Transactions on Robotics and Automation , 2002
"... A patent pending, energy based, method is presented for controlling a haptic interface system to ensure stable contact under a wide variety of operating conditions. System stability is analyzed in terms of the time- domain definition of passivity. We define a "Passivity Observer" ( ..."
Abstract - Cited by 144 (23 self) - Add to MetaCart
" (PO) which measures energy flow in and out of one or more subsystems in real-time software. Active behavior is indicated by a negative value of the PO at any time. We also define the "Passivity Controller " (PC), an adaptive dissipative element which, at each time sample, absorbs

Stack-based Access Control and Secure Information Flow

by Anindya Banerjee, David A. Naumann , 2003
"... Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control mechani ..."
Abstract - Cited by 98 (18 self) - Add to MetaCart
Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control
Next 10 →
Results 1 - 10 of 1,619
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University