Sciweavers

7839 search results - page 203 / 1568
» What's there and what's not
Sort
View
STOC
2009
ACM
113views Algorithms» more  STOC 2009»
16 years 2 months ago
The extended BG-simulation and the characterization of t-resiliency
A distributed task T on n processors is an input/output relation between a collection of processors' inputs and outputs. While all tasks are solvable if no processor may ever...
Eli Gafni
VL
2007
IEEE
120views Visual Languages» more  VL 2007»
15 years 7 months ago
Finding Gender Differences in End-User Debugging: A Data Mining Approach
We are currently investigating what types of end user personas (or homogeneous groups in the population) exist and what works for or hinders each in end-user debugging. These pers...
Valentina Grigoreanu
ECIS
2001
15 years 2 months ago
Why information systems plans do not get implemented: A case study of a UK hospital
The progression of implementation of an information systems strategy in a UK acute hospital is described. The case study describes the IS strategy, the conditions that led to its ...
Neil McBride, Ray Hackney
CACM
2006
192views more  CACM 2006»
15 years 1 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
98
Voted
BIRTHDAY
2009
Springer
15 years 8 months ago
Combinatorial Problems for Horn Clauses
Given a family of Horn clauses, what is the minimal number of Horn clauses implying all other clauses in the family? What is the maximal number of Horn clauses from the family wit...
Marina Langlois, Dhruv Mubayi, Robert H. Sloan, Gy...