Sciweavers

68 search results - page 13 / 14
» Checkpointing of Control Structures in Main Memory Database ...
Sort
View
FTCS
1998
144views more  FTCS 1998»
14 years 3 days ago
Improving Software Robustness with Dependability Cases
Programs fail mainly for two reasons: logic errors in the code, and exception failures. Exception failures can account for up to 2/3 of system crashes [6], hence are worthy of ser...
Roy A. Maxion, Robert T. Olszewski
SIGMOD
2005
ACM
151views Database» more  SIGMOD 2005»
14 years 11 months ago
The 8 requirements of real-time stream processing
Applications that require real-time processing of high-volume data steams are pushing the limits of traditional data processing infrastructures. These stream-based applications in...
Michael Stonebraker, Ugur Çetintemel, Stanley B. ...
CORR
2010
Springer
257views Education» more  CORR 2010»
13 years 8 months ago
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence
Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific hu...
Harshith C, Karthik R. Shastry, Manoj Ravindran, M...
ICVS
2003
Springer
14 years 4 months ago
Tree Supported Road Extraction from Arial Images Using Global and Local Context Knowledge
The quality control and update of geo-data, in this case especially of road-data, is the primary aim of the system, which is presented in the paper. One important task of the syste...
Matthias Butenuth, Bernd-Michael Straub, Christian...
VLDB
2004
ACM
163views Database» more  VLDB 2004»
14 years 4 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...