Sciweavers

3909 search results - page 377 / 782
» Extreme Model Checking
Sort
View
ICDM
2008
IEEE
252views Data Mining» more  ICDM 2008»
15 years 11 months ago
Data Mining for Climate Change and Impacts
Knowledge discovery from temporal, spatial and spatiotemporal data is critical for climate change science and climate impacts. Climate statistics is a mature area. However, recent...
Auroop R. Ganguly, Karsten Steinhaeuser
COCOON
2007
Springer
15 years 10 months ago
Streaming Algorithms Measured in Terms of the Computed Quantity
The last decade witnessed the extensive studies of algorithms for data streams. In this model, the input is given as a sequence of items passing only once or a few times, and we ar...
Shengyu Zhang
ESORICS
2007
Springer
15 years 10 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
INFOCOM
2005
IEEE
15 years 10 months ago
Differentiated bandwidth sharing with disparate flow sizes
Abstract— We consider a multi-class queueing system operating under the Discriminatory Processor-Sharing (DPS) discipline. The DPS discipline provides a natural approach for mode...
Gijs van Kessel, R. Núñez Queija, Se...
VLDB
1990
ACM
83views Database» more  VLDB 1990»
15 years 8 months ago
A Formal Approach to Recovery by Compensating Transactions
Compensating transactions are intended to handle situations where it is required to undo either committed or uncommitted transactions that affect other transactions, without resor...
Henry F. Korth, Eliezer Levy, Abraham Silberschatz