Sciweavers

576 search results - page 86 / 116
» Uncertainty in Knowledge Provenance
Sort
View
KAIS
2008
151views more  KAIS 2008»
13 years 9 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
SAC
2006
ACM
13 years 9 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
SIAMCO
2000
123views more  SIAMCO 2000»
13 years 9 months ago
Adaptive LQG Control of Input-Output Systems---A Cost-biased Approach
In this paper, we consider linear systems in input-output form and introduce a new adaptive linear quadratic Gaussian (LQG) control scheme which is shown to be self-optimizing. The...
Maria Prandini, Marco C. Campi
TPDS
2002
80views more  TPDS 2002»
13 years 9 months ago
Performance Optimization Problem in Speculative Prefetching
Speculative prefetching has been proposed to improve the response time of network access. Previous studies in speculative prefetching focus on building and evaluating access models...
Nor Jaidi Tuah, Mohan Kumar, Svetha Venkatesh, Saj...
CLOUDCOM
2010
Springer
13 years 8 months ago
A Token-Based Access Control System for RDF Data in the Clouds
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...