Sciweavers

1456 search results - page 196 / 292
» Keeping encountered information
Sort
View
OSDI
2008
ACM
16 years 6 days ago
SQCK: A Declarative File System Checker
The lowly state of the art for file system checking and repair does not match what is needed to keep important data available for users. Current file system checkers, such as e2fs...
Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. A...
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
16 years 1 days ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
ICSE
2005
IEEE-ACM
15 years 12 months ago
Demand-driven structural testing with dynamic instrumentation
Producing reliable and robust software has become one of the most important software development concerns in recent years. Testing is a process by which software quality can be as...
Jonathan Misurda, James A. Clause, Juliya L. Reed,...
ICDE
2010
IEEE
262views Database» more  ICDE 2010»
15 years 11 months ago
Approximate String Search in Spatial Databases
Abstract-- This work presents a novel index structure, MHRtree, for efficiently answering approximate string match queries in large spatial databases. The MHR-tree is based on the ...
Bin Yao, Feifei Li, Marios Hadjieleftheriou, Kun H...
MOBIHOC
2007
ACM
15 years 11 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning