Sciweavers

336 search results - page 58 / 68
» Program Speedups in Theory and Practice
Sort
View
202
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 23 days ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
123
Voted
PODS
2006
ACM
138views Database» more  PODS 2006»
16 years 21 days ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
97
Voted
CORR
2004
Springer
151views Education» more  CORR 2004»
15 years 12 days ago
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occ...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
EWSN
2010
Springer
15 years 5 months ago
Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks
One unfortunate consequence of the success story of wireless sensor networks (WSNs) in separate research communities is an evergrowing gap between theory and practice. Even though ...
Tobias Baumgartner, Ioannis Chatzigiannakis, S&aac...
OCLC
2008
86views more  OCLC 2008»
15 years 15 days ago
Those who don't look don't find: disciplinary considerations in repository advocacy
Purpose of this paper By describing some of the often ignored aspects of repository advocacy, such as disciplinary differences and how these might affect the adoption of a particu...
Danny Kingsley