Sciweavers

1937 search results - page 313 / 388
» Conditioning Probabilistic Databases
Sort
View
64
Voted
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
15 years 2 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
VLDB
1992
ACM
105views Database» more  VLDB 1992»
15 years 2 months ago
Multiversion Query Locking
Multiversion two-phase locking (MV2PL) has been incorporated in some commercial transaction processing systems to support the serializable execution of queries. A drawback to this...
Paul M. Bober, Michael J. Carey
105
Voted
ER
2009
Springer
316views Database» more  ER 2009»
15 years 2 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
91
Voted
DASFAA
2009
IEEE
108views Database» more  DASFAA 2009»
15 years 2 months ago
An Effective and Efficient Method for Handling Transmission Failures in Sensor Networks
Abstract. The suppression scheme is a solution for limited energy constraints in sensor networks. Temporal suppression, spatial suppression and spatio-temporal suppression are prop...
Heejung Yang, Chin-Wan Chung
ATAL
2006
Springer
15 years 1 months ago
A decision-theoretic approach to file consistency in constrained peer-to-peer device networks
As users interact with an increasing array of personal computing devices, maintaining consistency of data across those devices becomes significantly more difficult. Typical soluti...
David L. Roberts, Sooraj Bhat, Charles Lee Isbell ...