Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Schedule (computer science)

Known as: Recoverable, Database schedule, Recoverable execution 
In the fields of databases and transaction processing (transaction management), a schedule (or history) of a system is an abstract model to describe… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Most of the existing demand-side management programs focus primarily on the interactions between a utility company and its… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we describe T-MAC, a contention-based Medium Access Control protocol for wireless sensor networks. Applications for… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Knoving in practice: Enacting a collettive capability in distributed organizing - In this paper, I outline a perspective on… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Efficient application scheduling is critical for achieving high performance in heterogeneous computing environments. The… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The first commercial United States natural gas production (1821) came from an organic-rich Devonian shale in the Appalachian… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Counter to the common belief that expert performance reflects innate abilities and capacities, recent research in different… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1986
Highly Cited
1986
  • A. Yao
  • FOCS
  • 1986
  • Corpus ID: 52818943
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is… Expand
Is this relevant?
Highly Cited
1967
Highly Cited
1967
Feel lonely? What about reading books? Book is one of the greatest friends to accompany while in your lonely time. When you have… Expand
Is this relevant?