Sciweavers

10790 search results - page 2080 / 2158
» Using feature models to automate model transformations
Sort
View
ISPASS
2008
IEEE
15 years 11 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 11 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
116
Voted
TARK
2007
Springer
15 years 10 months ago
Inexact knowledge, margin for error and positive introspection
Williamson (2000a) has argued that positive introspection is incompatible with inexact knowledge. His argument relies on a margin-for-error requirement for inexact knowledge based...
Julien Dutant
170
Voted
NMR
2004
Springer
15 years 10 months ago
A probabilistic approach to default reasoning
A logic is defined which in addition to propositional calculus contains several types of probabilistic operators which are applied only to propositional formulas. For every s ∈...
Miodrag Raskovic, Zoran Ognjanovic, Zoran Markovic
RAID
2004
Springer
15 years 10 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
« Prev « First page 2080 / 2158 Last » Next »