Sciweavers

953 search results - page 123 / 191
» A note on the paper
Sort
View
SAFECOMP
2000
Springer
13 years 11 months ago
Assessment of the Reliability of Fault-Tolerant Software: A Bayesian Approach
Fault tolerant systems based on the use of software design diversity may be able to achieve high levels of reliability more cost-effectively than other approaches, such as heroic ...
Bev Littlewood, Peter T. Popov, Lorenzo Strigini
CCECE
2009
IEEE
13 years 11 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
AAAI
2008
13 years 10 months ago
Dormant Independence
The construction of causal graphs from non-experimental data rests on a set of constraints that the graph structure imposes on all probability distributions compatible with the gr...
Ilya Shpitser, Judea Pearl
AINA
2008
IEEE
13 years 9 months ago
An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor Networks
It is important to design an energy efficient data gathering tree structure for wireless sensor networks. As for the energy efficiency, network's overall energy consumption an...
Soonmok Kwon, Jeonggyu Kim, Cheeha Kim
AIRWEB
2008
Springer
13 years 9 months ago
Analysing features of Japanese splogs and characteristics of keywords
This paper focuses on analyzing (Japanese) splogs based on various characteristics of keywords contained in them. We estimate the behavior of spammers when creating splogs from ot...
Yuuki Sato, Takehito Utsuro, Yoshiaki Murakami, To...