Sciweavers

10935 search results - page 1952 / 2187
» Neural Programming Language
Sort
View
121
Voted
ICALP
2000
Springer
15 years 5 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
IFIP
2000
Springer
15 years 5 months ago
Process as Theory in Information Systems Research
Many researchers have searched for evidence of organizational improvements from the huge sums invested in ICT. Unfortunately, evidence for such a pay back is spotty at best (e.g.,...
Kevin Crowston
IFIP
2000
Springer
15 years 5 months ago
Feminist Pedagogy and the Lap Top Computer
ducational Resources Information Center) the on-line education abstracts, show 15,000 entries under "computers and education" since 1992. Adoption of some level of inform...
Paula Chegwidden
150
Voted
LCTRTS
2000
Springer
15 years 5 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
ICDT
1995
ACM
96views Database» more  ICDT 1995»
15 years 5 months ago
On Two Forms of Structural Recursion
We investigate and compare two forms of recursion on sets for querying nested collections. The rst one is called sri and it corresponds to sequential processing of data. The second...
Dan Suciu, Limsoon Wong
« Prev « First page 1952 / 2187 Last » Next »