Sciweavers

1277 search results - page 190 / 256
» Views of Fibonacci dynamics
Sort
View
RSCTC
1993
Springer
96views Fuzzy Logic» more  RSCTC 1993»
14 years 2 months ago
Trusting an Information Agent
: While the common kinds of uncertainties in databases (e.g., null values, disjunction, corrupt/missing data, domain mismatch, etc.) have been extensively studied, a relatively une...
Hasan M. Jamil, Fereidoon Sadri
PODC
1990
ACM
14 years 2 months ago
Sharing Memory Robustly in Message-Passing Systems
Emulators that translate algorithms from the shared-memory model to two different message-passing models are presented. Both are achieved by implementing a wait-free, atomic, singl...
Hagit Attiya, Amotz Bar-Noy, Danny Dolev
VLDB
1989
ACM
105views Database» more  VLDB 1989»
14 years 2 months ago
Monitoring Database Objects
A method is described for actively interfacing an Object-Oriented Database Management System (OODBMS) to application pre grams. The method, called a database monitor, observes how...
Tore Risch
ICDCS
2010
IEEE
14 years 1 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
ICDCS
2010
IEEE
14 years 1 months ago
Divide and Conquer Algorithms for Publish/Subscribe Overlay Design
Abstract—Overlay network design for topic-based publish/subscribe systems is of primary importance because the overlay directly impacts the system’s performance. Determining a ...
Chen Chen, Hans-Arno Jacobsen, Roman Vitenberg