Sciweavers

6650 search results - page 1174 / 1330
» Mutating database queries
Sort
View
120
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
DECOR: DEClaritive network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundame...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
157
Voted
BIBE
2008
IEEE
272views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Design and implementation of the Smith-Waterman algorithm on the CUDA-compatible GPU
— This paper describes a design and implementation of the Smith-Waterman algorithm accelerated on the graphics processing unit (GPU). Our method is implemented using compute uni...
Yuma Munekawa, Fumihiko Ino, Kenichi Hagihara
DASFAA
2008
IEEE
109views Database» more  DASFAA 2008»
15 years 10 months ago
Bulk-Loading the ND-Tree in Non-ordered Discrete Data Spaces
Applications demanding multidimensional index structures for performing efficient similarity queries often involve a large amount of data. The conventional tuple-loading approach t...
Hyun-Jeong Seok, Gang Qian, Qiang Zhu, Alexander R...
128
Voted
DEXAW
2008
IEEE
252views Database» more  DEXAW 2008»
15 years 10 months ago
XML Tree Structure Compression
In an XML document a considerable fraction consists of markup, that is, begin and end-element tags describing the document’s tree structure. XML compression tools such as XMill ...
Sebastian Maneth, Nikolay Mihaylov, Sherif Sakr
132
Voted
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 10 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
« Prev « First page 1174 / 1330 Last » Next »