Sciweavers

4693 search results - page 834 / 939
» Verifying Hybrid Systems
Sort
View
95
Voted
CN
2004
109views more  CN 2004»
15 years 16 days ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...
COMCOM
2004
142views more  COMCOM 2004»
15 years 16 days ago
An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks
Bluetooth is a new short-range radio technology to form a small wireless system. In most of the current Bluetooth products, the master polls the slaves in a round robin manner and...
Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das
COMPSEC
2004
104views more  COMPSEC 2004»
15 years 16 days ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
CI
2000
134views more  CI 2000»
15 years 16 days ago
Choosing Rhetorical Structures to Plan Instructional Texts
This paper discusses a fundamental problem in natural language generation: how to organize the content of a text in a coherent and natural way. In this research, we set out to det...
Leila Kosseim, Guy Lapalme
113
Voted
DPD
2002
125views more  DPD 2002»
15 years 15 days ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung