Sciweavers

1516 search results - page 115 / 304
» Generalizing Indexical-Functional Reference
Sort
View
POPL
1998
ACM
15 years 2 months ago
Alias Analysis of Executable Code
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Saumya K. Debray, Robert Muth, Matthew Weippert
VLDB
1998
ACM
115views Database» more  VLDB 1998»
15 years 2 months ago
Bank of America Case Study: The Information Currency Advantage
This paper describes the external forces that motivate financial institutions to collect, aggregate, analyze, and mine data so that it can be transformed into information, one of ...
Felipe Cariño, Mark Jahnke
SIGCOMM
1997
ACM
15 years 2 months ago
Automated Packet Trace Analysis of TCP Implementations
We describe tcpanaly, a tool for automatically analyzing a TCP implementation's behavior by inspecting packet traces of the TCP's activity. Doing so requires surmounting...
Vern Paxson
KDD
1997
ACM
114views Data Mining» more  KDD 1997»
15 years 2 months ago
Schema Discovery for Semistructured Data
To formulate a meaningful query on semistructured data, such as on the Web, that matches some of the source’s structure, we need first to discover something about how the infor...
Ke Wang, Huiqing Liu
ICLP
1993
Springer
15 years 2 months ago
On Copy Avoidance in Single Assignment Languages
: Copy avoidance refers to the safe replacement, at compile time, of copying operations by destructive updates in single-assignment languages. Conceptually, the problem can be divi...
Saumya K. Debray