Sciweavers

4985 search results - page 891 / 997
» Observation of String-Rewriting Systems
Sort
View
127
Voted
OSDI
2004
ACM
16 years 4 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
209
Voted
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
16 years 3 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
220
Voted
SIGMOD
2007
ACM
125views Database» more  SIGMOD 2007»
16 years 3 months ago
Optimizing mpf queries: decision support and probabilistic inference
Managing uncertain data using probabilistic frameworks has attracted much interest lately in the database literature, and a central computational challenge is probabilistic infere...
Héctor Corrada Bravo, Raghu Ramakrishnan
166
Voted
ICFP
2008
ACM
16 years 3 months ago
Space profiling for parallel functional programs
This paper presents a semantic space profiler for parallel functional programs. Building on previous work in sequential profiling, our tools help programmers to relate runtime res...
Daniel Spoonhower, Guy E. Blelloch, Robert Harper,...
ICDE
2010
IEEE
539views Database» more  ICDE 2010»
16 years 3 months ago
Impact of Disk Corruption on Open-Source DBMS
Abstract-- Despite the best intentions of disk and RAID manufacturers, on-disk data can still become corrupted. In this paper, we examine the effects of corruption on database mana...
Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan...