Sciweavers

2584 search results - page 304 / 517
» On the Forward Checking Algorithm
Sort
View
WALCOM
2010
IEEE
221views Algorithms» more  WALCOM 2010»
15 years 1 months ago
Variants of Spreading Messages
In a distributed computing environment a faulty node could lead other nodes in the system to behave in a faulty manor. An initial set of faults could make all the nodes in the syst...
T. V. Thirumala Reddy, D. Sai Krishna, C. Pandu Ra...
112
Voted
ICPR
2010
IEEE
15 years 1 months ago
Performance Evaluation of Automatic Feature Discovery Focused within Error Clusters
We report performance evaluation of our automatic feature discovery method on the publicly available Gisette dataset: a set of 29 features discovered by our method ranks 129 among...
Sui-Yu Wang, Henry S. Baird
154
Voted
CIDR
2011
252views Algorithms» more  CIDR 2011»
14 years 7 months ago
Hyder - A Transactional Record Manager for Shared Flash
Hyder supports reads and writes on indexed records within classical multi-step transactions. It is designed to run on a cluster of servers that have shared access to a large pool ...
Philip A. Bernstein, Colin W. Reid, Sudipto Das
228
Voted
ICDE
2003
IEEE
134views Database» more  ICDE 2003»
16 years 4 months ago
Propagating XML Constraints to Relations
We present a technique for refining the design of relational storage for XML data based on XML key propagation. Three algorithms are presented: one checks whether a given function...
Susan B. Davidson, Wenfei Fan, Carmem S. Hara, Jin...
DAC
2000
ACM
16 years 4 months ago
To split or to conjoin: the question in image computation
Image computation is the key step in fixpoint computations that are extensively used in model checking. Two techniques have been used for this step: one based on conjunction of the...
In-Ho Moon, James H. Kukula, Kavita Ravi, Fabio So...