Sciweavers

543 search results - page 51 / 109
» Modeling and Executing the Data Warehouse Refreshment Proces...
Sort
View
90
Voted
IEEESP
2006
108views more  IEEESP 2006»
15 years 1 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
EDOC
2009
IEEE
15 years 5 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...
ICSE
2009
IEEE-ACM
15 years 8 months ago
Verifying networked programs using a model checker extension
Model checking finds failures in software by exploring every possible execution schedule. Until recently it has been mainly applied to stand-alone applications. This paper presen...
Watcharin Leungwattanakit, Cyrille Artho, Masami H...
ICS
2000
Tsinghua U.
15 years 5 months ago
Push vs. pull: data movement for linked data structures
As the performance gap between the CPU and main memory continues to grow, techniques to hide memory latency are essential to deliver a high performance computer system. Prefetchin...
Chia-Lin Yang, Alvin R. Lebeck
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 2 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...