Sciweavers

2599 search results - page 454 / 520
» An Operational Semantics for Knowledge Bases
Sort
View
CAV
2009
Springer
206views Hardware» more  CAV 2009»
15 years 10 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
ASPLOS
2010
ACM
15 years 4 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 4 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
ICDE
2008
IEEE
144views Database» more  ICDE 2008»
15 years 11 months ago
Fast and Highly-Available Stream Processing over Wide Area Networks
Abstract-- We present a replication-based approach that realizes both fast and highly-available stream processing over wide area networks. In our approach, multiple operator replic...
Jeong-Hyon Hwang, Stanley B. Zdonik, Ugur Ç...
ICLP
2009
Springer
15 years 10 months ago
Computing Loops with at Most One External Support Rule for Disjunctive Logic Programs
We extend to disjunctive logic programs our previous work on computing loop formulas of loops with at most one external support. We show that for these logic programs, loop formula...
Xiaoping Chen, Jianmin Ji, Fangzhen Lin