Sciweavers

2421 search results - page 123 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICASSP
2011
IEEE
14 years 4 months ago
A combined linear programming-maximum likelihood approach to radial velocity data analysis for extrasolar planet detection
In this paper we introduce a new technique for estimating the parameters of the Keplerian model commonly used in radial velocity data analysis for extrasolar planet detection. The...
Prabhu Babu, Petre Stoica
116
Voted
AC
1999
Springer
15 years 5 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava
123
Voted
FGCS
2011
153views more  FGCS 2011»
14 years 7 months ago
Representing distributed systems using the Open Provenance Model
From the World Wide Web to supply chains and scientific simulations, distributed systems are a widely used and important approach to building computational systems. Tracking prov...
Paul T. Groth, Luc Moreau
ISSS
2000
IEEE
109views Hardware» more  ISSS 2000»
15 years 5 months ago
Verification of Embedded Systems using a Petri Net based Representation
The ever increasing complexity of embedded systems consisting of hardware and software components poses a challenge in verifying their correctness, New verification methods that o...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
124
Voted
COMPGEOM
1997
ACM
15 years 5 months ago
Computing Exact Geometric Predicates Using Modular Arithmetic with Single Precision
Abstract: We propose an e cient method that determines the sign of a multivariate polynomial expression with integer coe cients. This is a central operation on which the robustness...
Hervé Brönnimann, Ioannis Z. Emiris, V...