Sciweavers

531 search results - page 80 / 107
» A strategy for selecting multiple components
Sort
View
141
Voted
CINQ
2004
Springer
163views Database» more  CINQ 2004»
15 years 9 months ago
Frequent Itemset Discovery with SQL Using Universal Quantification
Algorithms for finding frequent itemsets fall into two broad classes: (1) algorithms that are based on non-trivial SQL statements to query and update a database, and (2) algorithms...
Ralf Rantzau
135
Voted
SRDS
2003
IEEE
15 years 9 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
AISC
2010
Springer
15 years 8 months ago
Adapting Mathematical Domain Reasoners
Abstract. Mathematical learning environments help students in mastering mathematical knowledge. Mature environments typically offer thousands of interactive exercises. Providing f...
Bastiaan Heeren, Johan Jeuring
145
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
134
Voted
EELC
2006
118views Languages» more  EELC 2006»
15 years 7 months ago
Lexicon Convergence in a Population With and Without Metacommunication
How does a shared lexicon arise in population of agents with differing lexicons, and how can this shared lexicon be maintained over multiple generations? In order to get some insig...
Zoran Macura, Jonathan Ginzburg