Sciweavers

2421 search results - page 176 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
138
Voted
WETICE
2006
IEEE
15 years 9 months ago
The Case for Distributed Execution Replay Using a Virtual Machine
Debugging grid systems is complex, mainly because of the probe effect and non reproducible execution. The probe effect arises when an attempt to monitor a system changes the behav...
Nicolas Loriant, Jean-Marc Menaud
ACSC
2007
IEEE
15 years 10 months ago
Domination Normal Form - Decomposing Relational Database Schemas
A common approach in designing relational databases is to start with a universal relation schema, which is then decomposed into multiple subschemas. A good choice of subschemas ca...
Henning Köhler
129
Voted
AH
2000
Springer
15 years 8 months ago
Generating Personal Travel Guides from Discourse Plans
This paper describes a system that delivers travel guides tailored to individual needs. It does so by integrating a discourse planner with a system for querying the web and genera...
Ross Wilkinson, Shijian Lu, François Paradi...
JAR
2000
145views more  JAR 2000»
15 years 3 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
133
Voted
CORR
2008
Springer
197views Education» more  CORR 2008»
15 years 3 months ago
Sequential adaptive compressed sampling via Huffman codes
In this paper we introduce an information theoretic approach and use techniques from the theory of Huffman codes to construct a sequence of binary sampling vectors to determine a s...
Akram Aldroubi, Haichao Wang, Kourosh Zarringhalam