Sciweavers

PSYCHNOLOGY
2007
59views more  PSYCHNOLOGY 2007»
13 years 11 months ago
Identifying the (Tele)Presence Literature
This paper discusses the value of identifying the expanding interdisciplinary scholarly literature on the topic of (tele)presence, proposes a detailed procedure for doing so, and ...
Matthew Lombard, Matthew T. Jones
NA
2007
84views more  NA 2007»
13 years 11 months ago
A generalization of Euler's constant
: The purpose of this paper is to evaluate the limit γ(a) of the sequence 1 a + 1 a + 1 + · · · + 1 a + n − 1 − ln a + n − 1 a n∈N , where a ∈ (0, +∞). We give some...
Alina Sîntamarian
INFSOF
2008
85views more  INFSOF 2008»
13 years 11 months ago
Locating dependence structures using search-based slicing
This paper introduces an approach to locating dependence structures in a program by searching the space of the powerset of the set of all possible program slices. The paper formul...
Tao Jiang, Nicolas Gold, Mark Harman, Zheng Li
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 11 months ago
An upper bound on the number of states for a strongly universal hyperbolic cellular automaton on the pentagrid
In this paper, following the way opened by a previous paper deposited on arXiv, see[7], we give an upper bound to the number of states for a hyperbolic cellular automaton in the pe...
Maurice Margenstern
ACS
2008
13 years 11 months ago
A Zariski Topology for Bicomodules and Corings
In this paper we introduce and investigate top (bi)comodules of corings, that can be considered as dual to top (bi)modules of rings. The fully coprime spectra of such (bi)comodule...
Jawad Y. Abuhlail
WINET
2002
61views more  WINET 2002»
13 years 11 months ago
Multiple Working Points in Multichannel ALOHA with Deadlines
Abstract. This paper addresses the problem of maximizing the capacity of multichannel slotted ALOHA networks subject to a userspecified deadline and a permissible probability of ex...
Dror Baron, Yitzhak Birk
TKDE
2002
104views more  TKDE 2002»
13 years 11 months ago
The Presumed-Either Two-Phase Commit Protocol
This paper describes the presumed-either two-phase commit protocol. Presumed-either exploits log piggybacking to reduce the cost of committing transactions. If timely piggybacking ...
Gopi K. Attaluri, Kenneth Salem
STVR
2002
80views more  STVR 2002»
13 years 11 months ago
Conditioned slicing supports partition testing
This paper describes the use of conditioned slicing to assist partition testing, illustrating this with a case study. The paper shows how a conditioned slicing tool can be used to...
Robert M. Hierons, Mark Harman, Chris Fox, Lahcen ...
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
13 years 11 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
SIGKDD
2002
136views more  SIGKDD 2002»
13 years 11 months ago
A Survey on Wavelet Applications in Data Mining
Recently there has been significant development in the use of wavelet methods in various data mining processes. However, there has been written no comprehensive survey available o...
Tao Li, Qi Li, Shenghuo Zhu, Mitsunori Ogihara