Sciweavers

6031 search results - page 195 / 1207
» Communicating Transaction Processes
Sort
View
PODS
1999
ACM
127views Database» more  PODS 1999»
15 years 7 months ago
Atomicity with Incompatible Presumptions
We identify one of the incompatibility problems associated with atomic commit :protocols that prevents them from being used together and weiderive a correctness criterion that cap...
Yousef J. Al-Houmaily, Panos K. Chrysanthis
ASM
2010
ASM
15 years 5 months ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
119
Voted
FIMI
2004
134views Data Mining» more  FIMI 2004»
15 years 4 months ago
Recursion Pruning for the Apriori Algorithm
Implementations of the well-known Apriori algorithm for finding frequent item sets and associations rules usually rely on a doubly recursive scheme to count the subsets of a given...
Christian Borgelt
CACM
1999
132views more  CACM 1999»
15 years 3 months ago
Agents That Buy and Sell
Software agents have become very popular in the last six or so years. They have been used successfully to filter information, match people with similar interests and automate repe...
Pattie Maes, Robert H. Guttman, Alexandros Moukas
102
Voted
CORR
2006
Springer
79views Education» more  CORR 2006»
15 years 3 months ago
Source coding and channel requirements for unstable processes
Our understanding of information in systems has been based on the foundation of memoryless processes. Extensions to stable Markov and auto-regressive processes are classical. Berg...
Anant Sahai, Sanjoy K. Mitter