Sciweavers

5448 search results - page 1059 / 1090
» Breakpoints and Time in Distributed Computations
Sort
View
SIGSOFT
2007
ACM
16 years 1 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
ICDT
2009
ACM
150views Database» more  ICDT 2009»
16 years 1 months ago
Optimizing user views for workflows
A technique called user views has recently been proposed to focus user attention on relevant information in response to provenance queries over workflow executions [1, 2]: Given u...
Olivier Biton, Susan B. Davidson, Sanjeev Khanna, ...
WWW
2005
ACM
16 years 1 months ago
Scaling link-based similarity search
To exploit the similarity information hidden in the hyperlink structure of the web, this paper introduces algorithms scalable to graphs with billions of vertices on a distributed ...
Balázs Rácz, Dániel Fogaras
197
Voted
ASPLOS
2009
ACM
16 years 1 months ago
Mixed-mode multicore reliability
Future processors are expected to observe increasing rates of hardware faults. Using Dual-Modular Redundancy (DMR), two cores of a multicore can be loosely coupled to redundantly ...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
MOBISYS
2009
ACM
16 years 1 months ago
PEIR, the personal environmental impact report, as a platform for participatory sensing systems research
PEIR, the Personal Environmental Impact Report, is a participatory sensing application that uses location data sampled from everyday mobile phones to calculate personalized estima...
Min Mun, Sasank Reddy, Katie Shilton, Nathan Yau, ...
« Prev « First page 1059 / 1090 Last » Next »