Sciweavers

8928 search results - page 1543 / 1786
» Modeling Current Events
Sort
View
CASSIS
2004
Springer
15 years 7 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
CNSR
2004
IEEE
15 years 7 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
AUSDM
2006
Springer
110views Data Mining» more  AUSDM 2006»
15 years 7 months ago
Discovering Debtor Patterns of Centrelink Customers
Data mining is currently becoming an increasingly hot research field, but a large gap still remains between the research of data mining and its application in real-world business....
Yanchang Zhao, Longbing Cao, Yvonne Morrow, Yuming...
133
Voted
EGH
2004
Springer
15 years 7 months ago
Understanding the efficiency of GPU algorithms for matrix-matrix multiplication
Utilizing graphics hardware for general purpose numerical computations has become a topic of considerable interest. The implementation of streaming algorithms, typified by highly ...
Kayvon Fatahalian, Jeremy Sugerman, Pat Hanrahan
ER
2004
Springer
163views Database» more  ER 2004»
15 years 7 months ago
From Ontology to Relational Databases
The semantic web envisions a World Wide Web in which data is described with rich semantics and applications can pose complex queries. Ontologies, a cornerstone of the semantic web,...
Anuradha Gali, Cindy X. Chen, Kajal T. Claypool, R...
« Prev « First page 1543 / 1786 Last » Next »