Sciweavers

598 search results - page 48 / 120
» Generic Trace Theory
Sort
View
113
Voted
CSCLP
2003
Springer
15 years 8 months ago
Learning Approximate Consistencies
ing Soft Constraints: Some Experimental Results on Fuzzy CSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Stefano Bi...
Arnaud Lallouet, Andrei Legtchenko, Thi-Bich-Hanh ...
ISSS
2002
IEEE
106views Hardware» more  ISSS 2002»
15 years 8 months ago
Modeling Assembly Instruction Timing in Superscalar Architectures
This paper proposes an original model of the execution time of assembly instructions in superscalar architectures. The approach is based on a rigorous mathematical model and provi...
William Fornaciari, Vito Trianni, Carlo Brandolese...
SIGCOMM
2010
ACM
15 years 3 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
IPAW
2010
15 years 1 months ago
Data Provenance in Distributed Propagator Networks
Abstract. The heterogeneous and unreliable nature of distributed systems has created a distinct need for the inclusion of provenance within their design to allow for error correcti...
Ian Jacobi
160
Voted
IJDSST
2010
163views more  IJDSST 2010»
15 years 20 days ago
User's Behaviour inside a Digital Library
Abstract: CASPUR allows many academic Italian institutions located in the CentreSouth of Italy to access more than 7 million of articles through a digital library platform. We anal...
Marco Scarnò