Sciweavers

8491 search results - page 1525 / 1699
» Forecasting in Database Systems
Sort
View
CHI
2008
ACM
16 years 4 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2006
ACM
16 years 4 months ago
Verbosity: a game for collecting common-sense facts
We address the problem of collecting a database of "common-sense facts" using a computer game. Informally, a common-sense fact is a true statement about the world that i...
Luis von Ahn, Mihir Kedia, Manuel Blum
HPCA
2005
IEEE
16 years 4 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICSE
2007
IEEE-ACM
16 years 4 months ago
Mining Software Engineering Data
Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's...
Tao Xie, Jian Pei, Ahmed E. Hassan
SODA
2010
ACM
196views Algorithms» more  SODA 2010»
16 years 1 months ago
Deletion Without Rebalancing in Balanced Binary Trees
We address the vexing issue of deletions in balanced trees. Rebalancing after a deletion is generally more complicated than rebalancing after an insertion. Textbooks neglect delet...
Siddhartha Sen, Robert E. Tarjan
« Prev « First page 1525 / 1699 Last » Next »