Sciweavers

2584 search results - page 187 / 517
» On the Forward Checking Algorithm
Sort
View
112
Voted
RTCSA
1999
IEEE
15 years 2 months ago
Dynamic Adjustment of Serialization Order Using Timestamp Intervals in Real-Time Databases
Although an optimistic approach has been shown to be better than locking protocols for real-time database systems (RTDBS), it has the problems of unnecessary restarts and heavy re...
Jan Lindström, Kimmo E. E. Raatikainen
78
Voted
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
81
Voted
EUC
2004
Springer
15 years 1 months ago
An Improved Handoff Technique for a Seamless Multimedia Services
Servicing mobile hosts over the Internet has some problems including nodes' location, independent addressing, address conversion and packet forwarding as well as mobile host&#...
Seung-Won Lee, Hyeon-Ok Hong, Seong-Ho Park, Yong ...
99
Voted
AAAI
1996
14 years 11 months ago
Enhancements of Branch and Bound Methods for the Maximal Constraint Satisfaction Problem
Two methods are described for enhancing performance of branch and bound methods for overconstrained CSPS. These methods improve either the upper or lower bound, respectively, duri...
Richard J. Wallace
77
Voted
ENTCS
2007
143views more  ENTCS 2007»
14 years 10 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn