Sciweavers

5263 search results - page 972 / 1053
» Open Constraint Optimization
Sort
View
143
Voted
EDBT
2006
ACM
143views Database» more  EDBT 2006»
16 years 3 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
149
Voted
ICDE
2010
IEEE
288views Database» more  ICDE 2010»
16 years 3 months ago
Fast In-Memory XPath Search using Compressed Indexes
A large fraction of an XML document typically consists of text data. The XPath query language allows text search via the equal, contains, and starts-with predicates. Such predicate...
Diego Arroyuelo, Francisco Claude, Sebastian Manet...
123
Voted
SODA
2010
ACM
146views Algorithms» more  SODA 2010»
16 years 29 days ago
Classified Stable Matching
We introduce the classified stable matching problem, a problem motivated by academic hiring. Suppose that a number of institutes are hiring faculty members from a pool of applican...
Chien-Chung Huang
117
Voted
ICCAD
2002
IEEE
161views Hardware» more  ICCAD 2002»
16 years 13 days ago
Non-tree routing for reliability and yield improvement
We propose to introduce redundant interconnects for manufacturing yield and reliability improvement. By introducing redundant interconnects, the potential for open faults is reduc...
Andrew B. Kahng, Bao Liu, Ion I. Mandoiu
119
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu