Sciweavers

759 search results - page 88 / 152
» What Can Be Implemented Anonymously
Sort
View
OSDI
2000
ACM
13 years 11 months ago
Trading Capacity for Performance in a Disk Array
A variety of performance-enhancing techniques, such as striping, mirroring, and rotational data replication, exist in the disk array literature. Given a fixed budget of disks, one...
Xiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wa...
WOA
2000
13 years 11 months ago
Agent Architecture for Score-based Web Local Search
Big changes are taking place in the area of information supply and demand on Internet. The first big change, which took place quite a while ago, is related to the type of informat...
Michele Angelaccio, Berta Buttarazzi
AIPS
1996
13 years 11 months ago
Planning Experiments: Resolving Interactions between Two Planning Spaces
Learning from experimentation allows a system to acquire planning domain knowledge by correcting its knowledge when an action execution fails. Experiments are designed and planned...
Yolanda Gil
IJCAI
1989
13 years 11 months ago
A Modest, but Semantically Well Founded, Inheritance Reasoner
A modest exception allowing inheritance reasoner is presented. The reasoner allows restricted, but semantically well founded, defeasible property inheritance. Furthermore, it give...
Fahiem Bacchus
CIDR
2009
152views Algorithms» more  CIDR 2009»
13 years 11 months ago
Visualizing the robustness of query execution
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time cond...
Goetz Graefe, Harumi A. Kuno, Janet L. Wiener