Sciweavers

425 search results - page 57 / 85
» On the additive constant of the k-server Work Function Algor...
Sort
View
IPPS
1998
IEEE
14 years 1 hour ago
Prioritized Token-Based Mutual Exclusion for Distributed Systems
A number of solutions have been proposed for the problem of mutual exclusion in distributed systems. Some of these approaches have since been extended to a prioritized environment...
Frank Mueller
ICDM
2009
IEEE
122views Data Mining» more  ICDM 2009»
14 years 2 months ago
Detecting and Interpreting Variable Interactions in Observational Ornithology Data
In this paper we demonstrate a practical approach to interaction detection on real data describing the abundance of different species of birds in the prairies east of the souther...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Wes...
FMCAD
2009
Springer
14 years 2 months ago
Scaling VLSI design debugging with interpolation
—Given an erroneous design, functional verification returns an error trace exhibiting a mismatch between the specification and the implementation of a design. Automated design ...
Brian Keng, Andreas G. Veneris
VLDB
2001
ACM
139views Database» more  VLDB 2001»
14 years 5 days ago
NetCube: A Scalable Tool for Fast Data Mining and Compression
We propose an novel method of computing and storing DataCubes. Our idea is to use Bayesian Networks, which can generate approximate counts for any query combination of attribute v...
Dimitris Margaritis, Christos Faloutsos, Sebastian...
SODA
2012
ACM
213views Algorithms» more  SODA 2012»
11 years 10 months ago
Expanders are universal for the class of all spanning trees
Given a class of graphs F, we say that a graph G is universal for F, or F-universal, if every H ∈ F is contained in G as a subgraph. The construction of sparse universal graphs ...
Daniel Johannsen, Michael Krivelevich, Wojciech Sa...