• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 128
Next 10 →

Ensuring Correctness During Process Configuration via Partner Synthesis

by Niels Lohmann B, Marcello La Rosa C
"... Variants of the same process can be encountered within one organization or across different organizations. For example, different municipalities, courts, and rental agencies all need to support highly similar processes. In fact, procurement and sales processes can be found in almost any organization ..."
Abstract - Add to MetaCart
of interdependencies between configuration decisions. In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the “operating guidelines ” used for partner synthesis. We view the configuration

Ensuring Correctness During Process Configuration via Partner Synthesis

by Niels Lohmannb, Marcello La Rosac
"... Variants of the same process can be encountered within one organization or across different organizations. For example, different municipalities, courts, and rental agencies all need to support highly similar processes. In fact, procurement and sales processes can be found in almost any organization ..."
Abstract - Add to MetaCart
of interdependencies between configuration decisions. In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the “operating guidelines ” used for partner synthesis. We view the configuration

Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis

by Wil Van Der Aalst, Niels Lohmann, Marcello La Rosa, Jingxin Xu
"... A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficu ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements using the notion of configuration guideline. As a result, we can characterize all feasible configurations (i. e., configurations without

Ensuring the stability of the genome: DNA damage checkpoints

by Christine Latif , Susan H Harvey , Matthew J O'connell - Sci. World J , 2001
"... The cellular response to DNA damage is vital for the cell's ability to maintain genomic integrity. Checkpoint signalling pathways, which induce a cell cycle arrest in response to DNA damage, are an essential component of this process. This is reflected by the functional conservation of these p ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The function of the G1/S DNA damage pathway is to allow repair to occur before S-phase and hence avoid replicating mutations during DNA synthesis identified as a tumour suppressor gene, and in some families where Li-Fraumeni syndrome is not associated with p53 mutation, inherited mutations in Chk2 have been

Prioritizing component compatibility tests via user preferences

by Il-chul Yoon, Alan Sussman, Atif Memon, Adam Porter - in: Proceedings of the 25th IEEE International Conference on Software Maintenance, 2009 , 2013
"... Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that de-velopers perform compatibility testing to ensure that their software systems build correctly over all deployable combi-nations of compone ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that de-velopers perform compatibility testing to ensure that their software systems build correctly over all deployable combi

1Sub-Nyquist Radar via Doppler Focusing

by Omer Bar-ilan, Yonina C. Eldar
"... Abstract—We investigate the problem of a monostatic pulse-Doppler radar transceiver trying to detect targets, sparsely populated in the radar’s unambiguous time-frequency region. Several past works employ compressed sensing (CS) algorithms to this type of problem, but either do not address sample ra ..."
Abstract - Add to MetaCart
rate sampling and digital processing, imposes no restrictions on the transmitter, and uses a CS dictionary with size which does not increase with increasing number of pulses P. Furthermore, in the presence of noise, Doppler focusing enjoys a signal-to-noise ratio (SNR) improvement which scales linearly

Multi-loop Position Analysis via Iterated Linear Programming

by unknown authors
"... Abstract — This paper presents a numerical method able to isolate all configurations that an arbitrary loop linkage can adopt, within given ranges for its degrees of freedom. The procedure is general, in the sense that it can be applied to single or multiple intermingled loops of arbitrary topology, ..."
Abstract - Add to MetaCart
Abstract — This paper presents a numerical method able to isolate all configurations that an arbitrary loop linkage can adopt, within given ranges for its degrees of freedom. The procedure is general, in the sense that it can be applied to single or multiple intermingled loops of arbitrary topology

Multi-loop Position Analysis via Iterated Linear Programming

by unknown authors
"... Abstract — This paper presents a numerical method able to isolate all configurations that an arbitrary loop linkage can adopt, within given ranges for its degrees of freedom. The procedure is general, in the sense that it can be applied to single or multiple intermingled loops of arbitrary topology. ..."
Abstract - Add to MetaCart
Abstract — This paper presents a numerical method able to isolate all configurations that an arbitrary loop linkage can adopt, within given ranges for its degrees of freedom. The procedure is general, in the sense that it can be applied to single or multiple intermingled loops of arbitrary topology

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 128
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University