Sciweavers

465 search results - page 91 / 93
» Programmable Hash Functions and Their Applications
Sort
View
POPL
2005
ACM
15 years 10 months ago
Mutatis mutandis: safe and predictable dynamic software updating
Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynami...
Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman,...
SIGMOD
2003
ACM
175views Database» more  SIGMOD 2003»
15 years 10 months ago
WinMagic : Subquery Elimination Using Window Aggregation
Database queries often take the form of correlated SQL queries. Correlation refers to the use of values from the outer query block to compute the inner subquery. This is a conveni...
Calisto Zuzarte, Hamid Pirahesh, Wenbin Ma, Qi Che...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
15 years 7 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
EUROSYS
2009
ACM
15 years 7 months ago
xCalls: safe I/O in memory transactions
Memory transactions, similar to database transactions, allow a programmer to focus on the logic of their program and let the system ensure that transactions are atomic and isolate...
Haris Volos, Andres Jaan Tack, Neelam Goyal, Micha...
WAIM
2009
Springer
15 years 4 months ago
StreetTiVo: Using a P2P XML Database System to Manage Multimedia Data in Your Living Room
StreetTiVo is a project that aims at bringing research results into the living room; in particular, a mix of current results in the areas of Peer-to-Peer XML Database Management Sy...
Ying Zhang, Arjen P. de Vries, Peter A. Boncz, Djo...