Sciweavers

2421 search results - page 62 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
89
Voted
IADIS
2004
15 years 2 months ago
Using EAI to build public access Web-based information systems
Enterprise Application Integration (EAI) techniques are today widely adopted to build Enterprise Information Systems. Moreover the increasing reliability of tools and techniques s...
Nicola Aloia, Cesare Concordia, Sabrina Tardelli
197
Voted
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
16 years 1 months ago
Merging Hierarchies Using Object Placement
The main challenge in integrating two hierarchies is determining the correspondence between the nodes and edges of each hierarchy. Traditionally, the correspondence is determined ...
Kai Zhao, Robert Ikeda, Hector Garcia-Molina
90
Voted
CGO
2007
IEEE
15 years 7 months ago
Rapidly Selecting Good Compiler Optimizations using Performance Counters
Applying the right compiler optimizations to a particular program can have a significant impact on program performance. Due to the non-linear interaction of compiler optimization...
John Cavazos, Grigori Fursin, Felix V. Agakov, Edw...
90
Voted
KBSE
2008
IEEE
15 years 7 months ago
Self-healing strategies for component integration faults
Software systems increasingly integrate Off-The-Shelf (OTS) components. However, due to the lack of knowledge about the reused OTS components, this integration is fragile and can ...
Hervé Chang, Leonardo Mariani, Mauro Pezz&e...
85
Voted
NOMS
2008
IEEE
15 years 7 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand