Sciweavers

2092 search results - page 319 / 419
» A Theory of Non-Deterministic Networks
Sort
View
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 9 months ago
Argumentation Based Constraint Acquisition
Efficient acquisition of constraint networks is a key factor for the applicability of constraint problem solving methods. Current techniques ease knowledge acquisition by generati...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich
CCR
2011
14 years 6 months ago
Session reports for SIGCOMM 2010
This document collects together reports of the sessions from the 2010 ACM SIGCOMM Conference, the annual conference of the ACM Special Interest Group on Data Communication (SIGCOM...
Shailesh Agrawal, Kavitha Athota, Pramod Bhatotia,...
SFM
2011
Springer
253views Formal Methods» more  SFM 2011»
14 years 2 months ago
Application-Layer Connector Synthesis
The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
Paola Inverardi, Romina Spalazzese, Massimo Tivoli
PODS
2012
ACM
297views Database» more  PODS 2012»
13 years 2 months ago
Query-based data pricing
Data is increasingly being bought and sold online, and Webbased marketplace services have emerged to facilitate these activities. However, current mechanisms for pricing data are ...
Paraschos Koutris, Prasang Upadhyaya, Magdalena Ba...
PODC
2012
ACM
13 years 2 months ago
The cost of fault tolerance in multi-party communication complexity
Multi-party communication complexity involves distributed computation of a function over inputs held by multiple distributed players. A key focus of distributed computing research...
Binbin Chen, Haifeng Yu, Yuda Zhao, Phillip B. Gib...