Sciweavers

793 search results - page 124 / 159
» Input Modeling Tools for Complex Problems
Sort
View
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 2 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
COOPIS
2003
IEEE
15 years 5 months ago
Static Type-Inference for Trust in Distributed Information Systems
Abstract. Decision-makers in critical fields such as medicine and finance make use of a wide range of information available over the Internet. Mediation, a data integration techn...
Premkumar T. Devanbu, Michael Gertz, Brian Toone
HPCA
2005
IEEE
16 years 5 days ago
Predicting Inter-Thread Cache Contention on a Chip Multi-Processor Architecture
This paper studies the impact of L2 cache sharing on threads that simultaneously share the cache, on a Chip Multi-Processor (CMP) architecture. Cache sharing impacts threads non-u...
Dhruba Chandra, Fei Guo, Seongbeom Kim, Yan Solihi...
CADE
2005
Springer
16 years 3 days ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
DEXAW
1998
IEEE
155views Database» more  DEXAW 1998»
15 years 4 months ago
Business-Oriented Component-Based Software Development and Evolution
Huge size and high complexity of legacy software are the main sources of today's software evolution problems. While we can ease software evolution with re-engineering tools, ...
Stan Jarzabek, Martin Hitz