Sciweavers

2501 search results - page 429 / 501
» Logics with Rank Operators
Sort
View
150
Voted
SSDBM
2005
IEEE
131views Database» more  SSDBM 2005»
15 years 9 months ago
Searching for Related Objects in Relational Databases
To discover knowledge or retrieve information from a relational database, a user often needs to find objects related to certain source objects. There are two main challenges in b...
Xiaoxin Yin, Jiawei Han, Jiong Yang
111
Voted
MINENET
2005
ACM
15 years 9 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
115
Voted
MSR
2005
ACM
15 years 9 months ago
SCQL: a formal model and a query language for source control repositories
Source Control Repositories are used in most software projects to store revisions to source code files. These repositories operate at the file level and support multiple users. ...
Abram Hindle, Daniel M. Germán
111
Voted
CONCUR
2005
Springer
15 years 9 months ago
Deriving Weak Bisimulation Congruences from Reduction Systems
The focus of process calculi is interaction rather than computation, and for this very reason: (i) their operational semantics is conveniently expressed by labelled transition syst...
Roberto Bruni, Fabio Gadducci, Ugo Montanari, Pawe...
140
Voted
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 9 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk