Sciweavers

3108 search results - page 99 / 622
» The Elements of Computer Credibility
Sort
View
CAISE
2005
Springer
15 years 10 months ago
Computing the Relevant Instances That May Violate an OCL Constraint
Integrity checking is aimed at efficiently determining whether the state of the information base is consistent after the application of a set of structural events. One possible way...
Jordi Cabot, Ernest Teniente
ISAAC
2010
Springer
233views Algorithms» more  ISAAC 2010»
15 years 2 months ago
Computing Sparse Multiples of Polynomials
We consider the problem of finding a sparse multiple of a polynomial. Given f F[x] of degree d, and a desired sparsity t, our goal is to determine if there exists a multiple h F[...
Mark Giesbrecht, Daniel S. Roche, Hrushikesh Tilak
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
EUROPAR
2009
Springer
15 years 9 months ago
Modeling Resubmission in Unreliable Grids: The Bottom-Up Approach
Abstract. Failure is an ordinary characteristic of large-scale distributed environments. Resubmission is a general strategy employed to cope with failures in grids. Here, we analyt...
Vandy Berten, Emmanuel Jeannot
EUSFLAT
2007
138views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
On the Reliability of Multistate Systems with Imprecise Probabilities
We consider the computation of multistate systems reliabilities in the presence of random set estimations for the elements' working abilities. It turns out that the Dempster-...
Michael Wagenknecht, Ulrike Gocht