Sciweavers

2527 search results - page 414 / 506
» A UML-Based Approach to System Testing
Sort
View
SENSYS
2004
ACM
15 years 9 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...
134
Voted
SIGIR
2003
ACM
15 years 8 months ago
Salton Award Lecture - Information retrieval and computer science: an evolving relationship
Following the tradition of these acceptance talks, I will be giving my thoughts on where our field is going. Any discussion of the future of information retrieval (IR) research, h...
W. Bruce Croft
119
Voted
ENVSOFT
2006
84views more  ENVSOFT 2006»
15 years 3 months ago
Modeling the fate of down-the-drain chemicals in rivers: An improved software for GREAT-ER
GREAT-ER (Geography-referenced Regional Exposure Assessment Tool for European Rivers) is a model system for predicting chemical fate and exposure in surface waters. The GREAT-ER a...
F. Koormann, J. Rominger, D. Schowanek, J.-O. Wagn...
SIGMOD
2009
ACM
138views Database» more  SIGMOD 2009»
16 years 3 months ago
PRIMA: archiving and querying historical data with evolving schemas
Schema evolution poses serious challenges in historical data management. Traditionally historical data have been archived either by (i) migrating them into the current schema vers...
Hyun J. Moon, Carlo Curino, MyungWon Ham, Carlo Za...
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 9 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan