Sciweavers

1791 search results - page 122 / 359
» Two Types of Multiple-Conclusion Systems
Sort
View
IJCAI
2003
13 years 10 months ago
Describing and Utilizing Constraints to Answer Queries in Data-Integration Systems
In data-integration systems, information sources often have various constraints such as “all houses stored at a source have a unique address.” These constraints are very usefu...
Chen Li
JSAC
2006
89views more  JSAC 2006»
13 years 9 months ago
Robust multiuser detection for multicarrier CDMA systems
Abstract--Multiuser detection (MUD) for code-division multiple-access (CDMA) systems usually relies on some a priori channel estimates, which are obtained either blindly or by usin...
Rensheng Wang, Hongbin Li, Tao Li
IJCSA
2007
116views more  IJCSA 2007»
13 years 9 months ago
What Enterprise Architecture and Enterprise Systems Usage Can and Can not Tell about Each Other
—There is an increased awareness of the roles that enterprise architecture (EA) and enterprise systems (ES) play in today’s organizations. EA and ES usage maturity models are u...
Maya Daneva, Pascal van Eck
QUESTA
2008
96views more  QUESTA 2008»
13 years 8 months ago
Reduction of a polling network to a single node
We consider a discrete-time tree network of polling servers where all packets are routed to the same node (called node 0), from which they leave the network. All packets have unit...
Paul Beekhuizen, Dee Denteneer, Jacques Resing
PLDI
2009
ACM
14 years 3 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...