Sciweavers

9316 search results - page 1749 / 1864
» Analysis of traceback techniques
Sort
View
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
16 years 1 days ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
PODS
2005
ACM
211views Database» more  PODS 2005»
16 years 21 hour ago
Join-distinct aggregate estimation over update streams
There is growing interest in algorithms for processing and querying continuous data streams (i.e., data that is seen only once in a fixed order) with limited memory resources. Pro...
Sumit Ganguly, Minos N. Garofalakis, Amit Kumar, R...
ICSE
2005
IEEE-ACM
15 years 12 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
ICFP
2008
ACM
15 years 12 months ago
A scheduling framework for general-purpose parallel languages
The trend in microprocessor design toward multicore and manycore processors means that future performance gains in software will largely come from harnessing parallelism. To reali...
Matthew Fluet, Mike Rainey, John H. Reppy
PERCOM
2004
ACM
15 years 11 months ago
Performance Issues with Vertical Handovers - Experiences from GPRS Cellular and WLAN Hot-spots Integration
Interworking heterogeneous wireless access technologies is an important step towards building the next generation, all-IP wireless access infrastructure. In this paper, we present...
Rajiv Chakravorty, Pablo Vidales, Kavitha Subraman...
« Prev « First page 1749 / 1864 Last » Next »