Sciweavers

928 search results - page 148 / 186
» Safety management of complex technology
Sort
View
CIA
1998
Springer
14 years 3 months ago
Multiagent Systems in Information-Rich Environments
Information-rich environments are the open environments that characterize most of the modern applications of computing technology. The applications include ubiquitous information a...
Michael N. Huhns, Munindar P. Singh
SPIRE
1998
Springer
14 years 3 months ago
Direct Pattern Matching on Compressed Text
We present a fast compression and decompression technique for natural language texts. The novelty is that the exact search can be done on the compressed text directly, using any k...
Edleno Silva de Moura, Gonzalo Navarro, Nivio Zivi...
CIKM
1997
Springer
14 years 3 months ago
An Analysis of Cardinality Constraints in Redundant Relationships
In this paper, we present a complete analysis of redundant relationships in the entity-relationship model. Existing approaches use the concept of functional dependencies for ident...
James Dullea, Il-Yeol Song
ISSS
1996
IEEE
102views Hardware» more  ISSS 1996»
14 years 3 months ago
Throughput Optimization in Disk-Based Real-Time Application Specific Systems
Traditionally, application specific computations have been focusing on numerically intensive data manipulation. Modern communications and DSP applications, such as WWW, interactiv...
Stephen Docy, Inki Hong, Miodrag Potkonjak
IDA
1997
Springer
14 years 3 months ago
How to Find Big-Oh in Your Data Set (and How Not to)
The empirical curve bounding problem is de ned as follows. Suppose data vectors X Y are presented such that E(Y i]) = f(X i]) where f(x) is an unknown function. The problem is to a...
Catherine C. McGeoch, Doina Precup, Paul R. Cohen