Sciweavers

11328 search results - page 2218 / 2266
» Timed Branching Processes
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 12 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 12 months ago
An Evidential Path Logic for Multi-Relational Networks
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Descr...
Marko A. Rodriguez, Joe Geldart
DC
2010
14 years 12 months ago
Refined quorum systems
It is considered good distributed computing practice to devise object implementations that tolerate contention, periods of asynchrony and a large number of failures, but perform f...
Rachid Guerraoui, Marko Vukolic
DSS
2008
103views more  DSS 2008»
14 years 12 months ago
Explaining clinical decisions by extracting regularity patterns
When solving clinical decision-making problems with modern graphical decision-theoretic models such as influence diagrams, we obtain decision tables with optimal decision alternat...
Concha Bielza, Juan A. Fernández del Pozo, ...
AEI
2006
108views more  AEI 2006»
14 years 12 months ago
Grammatical rules for specifying information for automated product data modeling
This paper presents a linguistic framework for developing a formal knowledge acquisition method. The framework is intended to empower domain experts to specify information require...
Ghang Lee, Charles M. Eastman, Rafael Sacks, Shamk...
« Prev « First page 2218 / 2266 Last » Next »