Sciweavers

5775 search results - page 1153 / 1155
» A Rationale-based Analysis Tool
Sort
View
PVLDB
2008
100views more  PVLDB 2008»
13 years 5 months ago
Efficiently approximating query optimizer plan diagrams
Given a parametrized n-dimensional SQL query template and a choice of query optimizer, a plan diagram is a color-coded pictorial enumeration of the execution plan choices of the o...
Atreyee Dey, Sourjya Bhaumik, Harish D., Jayant R....
CIKM
2010
Springer
13 years 4 months ago
Third workshop on exploiting semantic annotations in information retrieval (ESAIR): CIKM 2010 workshop
There is an increasing amount of structure on the Web as a result of modern Web languages, user tagging and annotation, and emerging robust NLP tools. These meaningful, semantic, ...
Jaap Kamps, Jussi Karlgren, Ralf Schenkel
IPL
2010
119views more  IPL 2010»
13 years 4 months ago
Note on Max Lin-2 above Average
In the Max Lin-2 problem we are given a system S of m linear equations in n variables over F2 in which Equation j is assigned a positive integral weight wj for each j. We wish to ...
Robert Crowston, Gregory Gutin, Mark Jones
OOPSLA
2010
Springer
13 years 4 months ago
Managing ambiguity in programming by finding unambiguous examples
We propose a new way to raise the level of discourse in the programming process: permit ambiguity, but manage it by linking it to unambiguous examples. This allows programming env...
Kenneth C. Arnold, Henry Lieberman
RAID
2010
Springer
13 years 4 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
« Prev « First page 1153 / 1155 Last » Next »