Sciweavers

657 search results - page 98 / 132
» Recovering architectural assumptions
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 6 days ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 5 days ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
VLDB
2007
ACM
121views Database» more  VLDB 2007»
16 years 1 days ago
Efficient Keyword Search over Virtual XML Views
Emerging applications such as personalized portals, enterprise search and web integration systems often require keyword search over semi-structured views. However, traditional inf...
Feng Shao, Lin Guo, Chavdar Botev, Anand Bhaskar, ...
SIGMOD
2005
ACM
138views Database» more  SIGMOD 2005»
15 years 12 months ago
Automatic Physical Database Tuning: A Relaxation-based Approach
In recent years there has been considerable research on automated selection of physical design in database systems. In current solutions, candidate access paths are heuristically ...
Nicolas Bruno, Surajit Chaudhuri
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
15 years 12 months ago
TelegraphCQ: Continuous Dataflow Processing
Increasingly pervasive networks are leading towards a world where data is constantly in motion. In such a world, conventional techniques for query processing, which were developed...
Sirish Chandrasekaran, Owen Cooper, Amol Deshpande...