Sciweavers

819 search results - page 134 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
87
Voted
SIGSOFT
2010
ACM
14 years 8 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
SIGMOD
1993
ACM
150views Database» more  SIGMOD 1993»
15 years 2 months ago
Predicate Migration: Optimizing Queries with Expensive Predicates
The traditional focus of relational query optimization schemes has been on the choice of join methods and join orders. Restrictions have typically been handled in query optimizers ...
Joseph M. Hellerstein, Michael Stonebraker
84
Voted
CCS
2007
ACM
15 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
88
Voted
CVPR
2005
IEEE
16 years 7 days ago
Feature Uncertainty Arising from Covariant Image Noise
Uncertainty estimates related to the position of image features are seeing increasing use in several computer vision problems. Many of these have been recast from standard least s...
R. Matt Steele, Christopher O. Jaynes
WDAG
2009
Springer
91views Algorithms» more  WDAG 2009»
15 years 4 months ago
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures
Abstract. Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model t...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...