Sciweavers

668 search results - page 79 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
TKDE
2008
117views more  TKDE 2008»
15 years 3 months ago
Competitor Mining with the Web
This paper is concerned with the problem of mining competitors from the Web automatically. Nowadays, the fierce competition in the market necessitates every company to know not onl...
Shenghua Bao, Rui Li, Yong Yu, Yunbo Cao
CIKM
2010
Springer
15 years 1 months ago
FD-buffer: a buffer manager for databases on flash disks
We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: w...
Sai Tung On, Yinan Li, Bingsheng He, Ming Wu, Qion...
EMNLP
2009
15 years 29 days ago
Character-level Analysis of Semi-Structured Documents for Set Expansion
Set expansion refers to expanding a partial set of "seed" objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), w...
Richard C. Wang, William W. Cohen
NAR
2010
140views more  NAR 2010»
14 years 10 months ago
GUIDANCE: a web server for assessing alignment confidence scores
Evaluating the accuracy of multiple sequence alignment (MSA) is critical for virtually every comparative sequence analysis that uses an MSA as input. Here we present the GUIDANCE ...
Osnat Penn, Eyal Privman, Haim Ashkenazy, Giddy La...
SIGMOD
2011
ACM
290views Database» more  SIGMOD 2011»
14 years 6 months ago
Database state generation via dynamic symbolic execution for coverage criteria
Automatically generating sufficient database states is imperative to reduce human efforts in testing database applications. Complementing the traditional block or branch coverage...
Kai Pan, Xintao Wu, Tao Xie