Sciweavers

4397 search results - page 540 / 880
» Relational Algebra Operations
Sort
View
WAC
2005
Springer
118views Communications» more  WAC 2005»
15 years 10 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
IMC
2004
ACM
15 years 10 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis
VLDB
2004
ACM
122views Database» more  VLDB 2004»
15 years 9 months ago
Cache-Conscious Radix-Decluster Projections
As CPUs become more powerful with Moore’s law and memory latencies stay constant, the impact of the memory access performance bottleneck continues to grow on relational operator...
Stefan Manegold, Peter A. Boncz, Niels Nes
EDOC
2003
IEEE
15 years 9 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ISSRE
2003
IEEE
15 years 9 months ago
Exploiting Symmetries to Test Programs
Symmetries often appear as properties of many artifical settings. In Program Testing, they can be viewed as properties of programs and can be given by the tester to check the cor...
Arnaud Gotlieb