Sciweavers

1690 search results - page 298 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
ICDT
2010
ACM
180views Database» more  ICDT 2010»
15 years 4 months ago
Composing local-as-view mappings: closure and applications
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia C. Arocena, Ariel Fuxman, Renée J....
CHARME
2003
Springer
110views Hardware» more  CHARME 2003»
15 years 4 months ago
Exact and Efficient Verification of Parameterized Cache Coherence Protocols
Abstract. We propose new, tractably (in some cases provably) efficient algorithmic methods for exact (sound and complete) parameterized reasoning about cache coherence protocols. F...
E. Allen Emerson, Vineet Kahlon
105
Voted
CIKM
2009
Springer
15 years 4 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
83
Voted
CORR
2006
Springer
90views Education» more  CORR 2006»
15 years 22 days ago
On entropy for mixtures of discrete and continuous variables
Let X be a discrete random variable with support S and f : S S be a bijection. Then it is wellknown that the entropy of X is the same as the entropy of f(X). This entropy preserva...
Chandra Nair, Balaji Prabhakar, Devavrat Shah
CIKM
2008
Springer
15 years 2 months ago
Mining social networks using heat diffusion processes for marketing candidates selection
Social Network Marketing techniques employ pre-existing social networks to increase brands or products awareness through word-of-mouth promotion. Full understanding of social netw...
Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King