Sciweavers

1893 search results - page 302 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
SIGMETRICS
1992
ACM
145views Hardware» more  SIGMETRICS 1992»
14 years 5 days ago
Analysis of the Generalized Clock Buffer Replacement Scheme for Database Transaction Processing
The CLOCK algorithm is a popular buffer replacement algorithm becauseof its simplicity and its ability to approximate the performance of the Least Recently Used (LRU) replacement ...
Victor F. Nicola, Asit Dan, Daniel M. Dias
ALGOSENSORS
2004
Springer
13 years 12 months ago
Towards a Dynamical Model for Wireless Sensor Networks
In this paper we introduce a dynamical model for wireless sensor networks. We obtain a convergent martingale for the broadcast process in such networks. To our knowledge, such mart...
Pierre Leone, José D. P. Rolim
KDD
1997
ACM
154views Data Mining» more  KDD 1997»
13 years 11 months ago
Autonomous Discovery of Reliable Exception Rules
This paper presents an autonomous algorithm for discovering exception rules from data sets. An exception rule, which is defined as a deviational pattern to a well-known fact, exhi...
Einoshin Suzuki
GECCO
2010
Springer
153views Optimization» more  GECCO 2010»
13 years 11 months ago
Multi-task evolutionary shaping without pre-specified representations
Shaping functions can be used in multi-task reinforcement learning (RL) to incorporate knowledge from previously experienced tasks to speed up learning on a new task. So far, rese...
Matthijs Snel, Shimon Whiteson
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 10 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg