Sciweavers

823 search results - page 150 / 165
» Location Based Access to Moving Data Sources
Sort
View
SIGMOD
2000
ACM
161views Database» more  SIGMOD 2000»
15 years 1 months ago
Answering Complex SQL Queries Using Automatic Summary Tables
We investigate the problem of using materialized views to answer SQL queries. We focus on modern decision-support queries, which involve joins, arithmetic operations and other (po...
Markos Zaharioudakis, Roberta Cochrane, George Lap...
SIGCSE
1999
ACM
193views Education» more  SIGCSE 1999»
15 years 1 months ago
Cache conscious programming in undergraduate computer science
The wide-spread use of microprocessor based systems that utilize cache memory to alleviate excessively long DRAM access times introduces a new dimension in the quest to obtain goo...
Alvin R. Lebeck
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
91
Voted
DOCENG
2005
ACM
14 years 11 months ago
Integrating translation services within a structured editor
Fully automatic machine translation cannot produce high quality translation; Dialog-Based Machine Translation (DBMT) is the only way to provide authors with a means of translating...
Ali Choumane, Hervé Blanchon, Cécile...
94
Voted
HPDC
2008
IEEE
14 years 9 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...