Sciweavers

661 search results - page 82 / 133
» What Can We Expect from Program Verification
Sort
View
VECPAR
2004
Springer
14 years 2 months ago
Message Strip-Mining Heuristics for High Speed Networks
In this work we investigate how the compiler technique of message strip mining performs in practice on contemporary high performance networks. Message strip mining attempts to redu...
Costin Iancu, Parry Husbands, Wei Chen
MOBIDE
1999
ACM
14 years 1 months ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham
AAAI
1998
13 years 10 months ago
A Script-Based Approach to Modifying Knowledge-Based Systems
Modifyingknowledge-based systems is a complexactivity. One of its di culties is that several related portions of the system might have to be changed in order to maintain the coher...
Marcelo Tallis

Lecture Notes
4961views
15 years 6 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
UAI
1997
13 years 10 months ago
Robustness Analysis of Bayesian Networks with Local Convex Sets of Distributions
Robust Bayesian inference is the calculation of posterior probability bounds given perturbations in a probabilistic model. This paper focuses on perturbations that can be expresse...
Fabio Gagliardi Cozman