Sciweavers

813 search results - page 12 / 163
» Pipeline-centric provenance model
Sort
View
EDBT
2010
ACM
164views Database» more  EDBT 2010»
13 years 11 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
PODS
2011
ACM
163views Database» more  PODS 2011»
12 years 10 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 1 months ago
Yield modelling and Yield Enhancement for FPGAs using Fault Tolerance Schemes
This paper presents a revised model for the yield analysis of FPGA interconnect layers. Based on proven yield models, this work improves the predictions and assumptions of previous...
Nicola Campregher, Peter Y. K. Cheung, George A. C...
CDC
2010
IEEE
133views Control Systems» more  CDC 2010»
13 years 2 months ago
Estimating state-space models in innovations form using the expectation maximisation algorithm
The expectation maximisation (EM) algorithm has proven to be effective for a range of identification problems. Unfortunately, the way in which the EM algorithm has previously been ...
Adrian Wills, Thomas B. Schön, Brett Ninness
EUROCRYPT
2001
Springer
14 years 4 days ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe