Sciweavers

804 search results - page 84 / 161
» On the Termination of the Chase Algorithm
Sort
View
78
Voted
CORR
1999
Springer
61views Education» more  CORR 1999»
15 years 7 days ago
Language Identification With Confidence Limits
A statistical classification algorithm and its application to language identification from noisy input are described. The main innovation is to compute confidence limits on the cl...
David Elworthy
119
Voted
APN
2010
Springer
14 years 10 months ago
Learning Workflow Petri Nets
Workflow mining is the task of automatically producing a workflow model from a set of event logs recording sequences of workflow events; each sequence corresponds to a use case or ...
Javier Esparza, Martin Leucker, Maximilian Schlund
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 7 months ago
Distributed Link Scheduling for TDMA Mesh Networks
— We present a distributed scheduling algorithm for provisioning of guaranteed link bandwidths in ad hoc mesh networks. The guaranteed link bandwidths are necessary to provide de...
Petar Djukic, Shahrokh Valaee
QEST
2008
IEEE
15 years 7 months ago
Quasi-Birth-Death Processes, Tree-Like QBDs, Probabilistic 1-Counter Automata, and Pushdown Systems
We begin by observing that (discrete-time) QuasiBirth-Death Processes (QBDs) are equivalent, in a precise sense, to (discrete-time) probabilistic 1-Counter Automata (p1CAs), and b...
Kousha Etessami, Dominik Wojtczak, Mihalis Yannaka...
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...