Sciweavers

1419 search results - page 209 / 284
» Notes on Formalizing Context
Sort
View
88
Voted
EDBT
2010
ACM
127views Database» more  EDBT 2010»
15 years 7 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett
AINA
2009
IEEE
15 years 7 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
97
Voted
SAC
2009
ACM
15 years 7 months ago
Semantic information and sensor networks
Embedded Networked Sensing involves untethered, networked devices tightly coupled to the physical world, to monitor and interact with it. Raw sensor observation can be annotated w...
Krishnaprasad Thirunarayan, Joshua Pschorr
FOSSACS
2009
Springer
15 years 7 months ago
Synthesis from Component Libraries
Abstract. Synthesis is the automatic construction of a system from its specification. In the classical synthesis algorithms it is always assumed the system is “constructed from ...
Yoad Lustig, Moshe Y. Vardi
110
Voted
DSN
2009
IEEE
15 years 7 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman