Sciweavers

3639 search results - page 603 / 728
» Provenance as Dependency Analysis
Sort
View
127
Voted
IWFM
2000
107views Formal Methods» more  IWFM 2000»
15 years 2 months ago
A Comparison of Three Model Checkers Applied to a Distributed Database Problem
ct Increasingly, model checking is being applied to more abstract problem domains than the traditional protocol analysis. The extent to which such an approach is able to provide us...
A. J. Currie
MASCOTS
2000
15 years 2 months ago
A Transaction-Level Tool for Predicting TCP Performance and for Network Engineering
Most network engineering tools are unsatisfactory. Measurements are not predictive, simulations do not scale, and analysis is limited to oversimplified models. To be more useful, ...
Jean C. Walrand
93
Voted
NIPS
2000
15 years 2 months ago
Processing of Time Series by Neural Circuits with Biologically Realistic Synaptic Dynamics
Experimental data show that biological synapses behave quite differently from the symbolic synapses in common artificial neural network models. Biological synapses are dynamic, i....
Thomas Natschläger, Wolfgang Maass, Eduardo D...
IJCAI
1997
15 years 2 months ago
A Music Stream Segregation System Based on Adaptive Multi-Agents
A principal problem of auditory scene analysis is stream segregation: decomposing an input acoustic signal into signals of individual sound sources included in the input. While ex...
Kunio Kashino, Hiroshi Murase
IJCAI
1997
15 years 2 months ago
Machine Learning Techniques to Make Computers Easier to Use
Identifying user-dependent information that can be automatically collected helps build a user model by which 1) to predict what the user wants to do next and 2) to do relevant pre...
Hiroshi Motoda, Kenichi Yoshida