Sciweavers

406 search results - page 44 / 82
» PASSing the provenance challenge
Sort
View
DSN
2009
IEEE
15 years 1 months ago
Evaluating the impact of Undetected Disk Errors in RAID systems
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, b...
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan...
EDBT
2009
ACM
144views Database» more  EDBT 2009»
15 years 1 months ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu
CHARME
2003
Springer
97views Hardware» more  CHARME 2003»
15 years 1 months ago
Coverage Metrics for Formal Verification
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete ...
Hana Chockler, Orna Kupferman, Moshe Y. Vardi
AIPS
2010
15 years 21 hour ago
Improving Determinization in Hindsight for On-line Probabilistic Planning
Recently, `determinization in hindsight' has enjoyed surprising success in on-line probabilistic planning. This technique evaluates the actions available in the current state...
Sung Wook Yoon, Wheeler Ruml, J. Benton, Minh Do
78
Voted
CCIA
2008
Springer
14 years 11 months ago
Using Electronic Institutions for Hospitals Chronic Disease Management and Purchasing System
Use of multi-agent systems (MAS) in health-care domains is increasing. MAS is an appropriate technique for many medical domains due to the characteristics of the problems in this a...
Ashkan Musavi, Maite López-Sánchez, ...