Sciweavers

10038 search results - page 1999 / 2008
» Model Checking for Managers
Sort
View
TSE
1998
176views more  TSE 1998»
13 years 7 months ago
Constructive Protocol Specification Using Cicero
—New protocols are often useful, but are hard to implement well. Protocol synthesis is a solution, but synthesized protocols can be slow. Implementing protocols will be even more...
Yen-Min Huang, Chinya V. Ravishankar
TPDS
2002
104views more  TPDS 2002»
13 years 7 months ago
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
The Internet is undergoing substantial changes from a communication and browsing infrastructure to a medium for conducting business and marketing a myriad of services. The World W...
Tarek F. Abdelzaher, Kang G. Shin, Nina T. Bhatti
PVLDB
2008
122views more  PVLDB 2008»
13 years 7 months ago
Exploiting shared correlations in probabilistic databases
There has been a recent surge in work in probabilistic databases, propelled in large part by the huge increase in noisy data sources -from sensor data, experimental data, data fro...
Prithviraj Sen, Amol Deshpande, Lise Getoor
SAC
2008
ACM
13 years 7 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
CIKM
2010
Springer
13 years 6 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
« Prev « First page 1999 / 2008 Last » Next »