Sciweavers

897 search results - page 44 / 180
» Identity: How to name it, How to find it
Sort
View
PREMI
2005
Springer
14 years 2 months ago
Systematically Evolving Configuration Parameters for Computational Intelligence Methods
The configuration of a computational intelligence (CI) method is responsible for its intelligence (e.g. tolerance, flexibility) as well as its accuracy. In this paper, we investiga...
Jason M. Proctor, Rosina Weber
WMCSA
2008
IEEE
14 years 3 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
COMPSAC
2002
IEEE
14 years 1 months ago
Using RAIC for Dependable On-line Upgrading of Distributed Systems
Redundant Arrays of Independent Components (RAIC) is a technology that uses groups of similar or identical distributed components to provide dependable services [1,2,3]. RAIC allo...
Chang Liu, Debra J. Richardson
LICS
1993
IEEE
14 years 25 days ago
Full Abstraction for a Shared Variable Parallel Language
traction for a Shared Variable Parallel Language Stephen Brookes∗ School of Computer Science Carnegie Mellon University Pittsburgh, Pa 15213 We give a new denotational semantics...
Stephen D. Brookes
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 8 months ago
Exact Failure Frequency Calculations for Extended Systems
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product...
Annie Druault-Vicard, Christian Tanguy