Sciweavers

232
Voted
LADC
2011
Springer
14 years 6 months ago
Byzantine Fault-Tolerant Deferred Update Replication
Abstract—Replication is a well-established approach to increasing database availability. Many database replication protocols have been proposed for the crash-stop failure model, ...
Fernando Pedone, Nicolas Schiper, José Enri...
LADC
2011
Springer
14 years 6 months ago
Timing Analysis of Leader-Based and Decentralized Byzantine Consensus Algorithms
—We compare in an analytical way two leader-based and decentralized algorithms (that is, algorithms that do not use a leader) for Byzantine consensus with strong validity. We sho...
Fatemeh Borran, Martin Hutle, André Schiper
237
Voted
LACL
2011
Springer
14 years 6 months ago
Using Logic in the Generation of Referring Expressions
The problem of generating referring expressions (GRE) is an important task in natural language generation. In this paper, we advocate for the use of logical languages in the output...
Carlos Areces, Santiago Figueira, Daniel Gor&iacut...
166
Voted
KIVS
2011
Springer
14 years 6 months ago
A Feasibility Check for Geographical Cluster Based Routing under Inaccurate Node Localization in Wireless Sensor Networks
Localized geographic single path routing along a wireless network graph requires exact location information about the network nodes to assure message delivery guarantees. Node loc...
Hannes Frey, Ranjith Pillay
222
Voted
KIVS
2011
Springer
14 years 6 months ago
Alister 2.0 - Programmable Logic Controllers in Railway Interlocking Systems for Regional Lines of the DB Netze AG
Railway interlockings are dominated by highly proprietary systems. We present the development project Alister 2.0 – an interlocking system based on industry-proven standard comp...
Reiner Saykowski, Elferik Schultz, Joachim Bleidie...
KIVS
2011
Springer
14 years 6 months ago
Automated generic integration of flight logbook data into aircraft maintenance systems
Oliver Hunte, Carsten Kleiner, Uwe Koch, Arne Kosc...
207
Voted
KESAMSTA
2011
Springer
14 years 6 months ago
Extending the JADE Agent Behaviour Model with JBehaviourTrees Framework
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do...
Iva Bojic, Tomislav Lipic, Mario Kusek, Gordan Jez...
258
Voted
KER
2011
14 years 6 months ago
Data mining: past, present and future
Data mining has become a well established discipline within the domain of Artificial Intelligence (AI) and Knowledge Engineering (KE). It has its roots in machine learning and st...
Frans Coenen
157
Voted
KCAP
2011
ACM
14 years 6 months ago
On the role of user-generated metadata in audio visual collections
Recently, various crowdsourcing initiatives showed that targeted efforts of user communities result in massive amounts of tags. For example, the Netherlands Institute for Sound a...
Riste Gligorov, Michiel Hildebrand, Jacco van Osse...
160
Voted
KCAP
2011
ACM
14 years 6 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...