Sciweavers

3791 search results - page 695 / 759
» Packing sets of patterns
Sort
View
ICSOC
2009
Springer
15 years 5 months ago
Evaluating Contract Compatibility for Service Composition in the SeCO2 Framework
Recently, the Software-as-a-Service (SaaS) model has been increasingly supported, becoming a major part of the new emerging cloud computing paradigms. Although SaaS exists in diff...
Marco Comerio, Hong Linh Truong, Flavio De Paoli, ...
ISSTA
2009
ACM
15 years 5 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
SIGIR
2009
ACM
15 years 5 months ago
Extracting structured information from user queries with semi-supervised conditional random fields
When search is against structured documents, it is beneficial to extract information from user queries in a format that is consistent with the backend data structure. As one step...
Xiao Li, Ye-Yi Wang, Alex Acero
SOUPS
2009
ACM
15 years 5 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
SYSTOR
2009
ACM
15 years 5 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...