Sciweavers

505 search results - page 27 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
POPL
2008
ACM
15 years 10 months ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume
IVC
2008
71views more  IVC 2008»
14 years 9 months ago
Topological triangle characterization with application to object detection from images
A novel mathematical framework inspired on Morse Theory for topological triangle characterization in 2D meshes is introduced that is useful for applications involving the creation...
Luis Gustavo Nonato, Mario A. S. Lizier, J. Batist...
SRDS
2005
IEEE
15 years 3 months ago
Database Replication Using Generalized Snapshot Isolation
Generalized snapshot isolation extends snapshot isolation as used in Oracle and other databases in a manner suitable for replicated databases. While (conventional) snapshot isolat...
Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone
NETCOOP
2007
Springer
15 years 3 months ago
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 3 months ago
Perceptions of Agility and Collaboration in Software Development Practice
Agility is a facet of software development attracting increasing interest. The purpose of this paper is to investigate the value of agility in practice. Data collected from senior...
Chaitali Patel, Mark Lycett, Robert D. Macredie, S...