Sciweavers

4491 search results - page 292 / 899
» Algorithm Engineering
Sort
View
110
Voted
WSDM
2009
ACM
104views Data Mining» more  WSDM 2009»
15 years 10 months ago
Top-k aggregation using intersections of ranked inputs
There has been considerable past work on efficiently computing top k objects by aggregating information from multiple ranked lists of these objects. An important instance of this...
Ravi Kumar, Kunal Punera, Torsten Suel, Sergei Vas...
115
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
In grid workflow systems, temporal correctness is critical to assure the timely completion of grid workflow execution. To monitor and control the temporal correctness, fixed-time ...
Jinjun Chen, Yun Yang
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
16 years 4 months ago
A Complete and Efficient Algebraic Compiler for XQuery
As XQuery nears standardization, more sophisticated XQuery applications are emerging, which often exploit the entire language and are applied to non-trivial XML sources. We propos...
Christopher Re, Jérôme Siméon,...
98
Voted
DAC
2001
ACM
16 years 4 months ago
Automated Pipeline Design
The interlock and forwarding logic is considered the tricky part of a fully-featured pipelined microprocessor and especially debugging these parts delays the hardware design proce...
Daniel Kroening, Wolfgang J. Paul
ICSE
2009
IEEE-ACM
16 years 4 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...