Sciweavers

666 search results - page 124 / 134
» When Similar Problems Don't Have Similar Solutions
Sort
View
SIGMETRICS
2005
ACM
110views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Empirical evaluation of multi-level buffer cache collaboration for storage systems
To bridge the increasing processor-disk performance gap, buffer caches are used in both storage clients (e.g. database systems) and storage servers to reduce the number of slow di...
Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scot...
RSFDGRC
2005
Springer
111views Data Mining» more  RSFDGRC 2005»
14 years 1 months ago
Knowledge Discovery Based Query Answering in Hierarchical Information Systems
The paper concerns failing queries in incomplete Distributed Autonomous Information Systems (DAIS) based on attributes which are hierarchical and which semantics at different site...
Zbigniew W. Ras, Agnieszka Dardzinska, Osman G&uum...
ATAL
2003
Springer
14 years 26 days ago
Coalition formation through motivation and trust
Cooperation is the fundamental underpinning of multi-agent systems, allowing agents to interact to achieve their goals. Where agents are self-interested, or potentially unreliable...
Nathan Griffiths, Michael Luck
WABI
2001
Springer
110views Bioinformatics» more  WABI 2001»
14 years 1 days ago
Boosting EM for Radiation Hybrid and Genetic Mapping
Radiation hybrid (RH) mapping is a somatic cell technique that is used for ordering markers along a chromosome and estimating physical distances between them. It nicely complements...
Thomas Schiex, Patrick Chabrier, Martin Bouchez, D...
CCS
2006
ACM
13 years 11 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...