Sciweavers

562 search results - page 50 / 113
» Dependency Pairs Revisited
Sort
View
110
Voted
DSN
2000
IEEE
15 years 6 months ago
Whither Generic Recovery from Application Faults? A Fault Study using Open-Source Software
This paper tests the hypothesis that generic recovery techniques, such as process pairs, can survive most application faults without using application-specific information. We ex...
Subhachandra Chandra, Peter M. Chen
128
Voted
IASTEDSE
2004
15 years 3 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
PKDD
2010
Springer
183views Data Mining» more  PKDD 2010»
15 years 8 days ago
Fast Active Exploration for Link-Based Preference Learning Using Gaussian Processes
Abstract. In preference learning, the algorithm observes pairwise relative judgments (preference) between items as training data for learning an ordering of all items. This is an i...
Zhao Xu, Kristian Kersting, Thorsten Joachims
82
Voted
IWANN
2009
Springer
15 years 8 months ago
GREAT: Gene Regulation EvAluation Tool
Our understanding of biological systems is highly dependent on the study of the mechanisms that regulate genetic expression. In this paper we present a tool to evaluate scientific ...
Catia Machado, Hugo P. Bastos, Francisco M. Couto
ICC
2008
IEEE
112views Communications» more  ICC 2008»
15 years 8 months ago
Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks
—For a wireless network with ¢ nodes distributed in an area £ , with ¢ source-destination pairs communicating with each other at some common rate, the hierarchical cooperation...
Javad Ghaderi, Liang-Liang Xie, Xuemin Shen