Sciweavers

12551 search results - page 2440 / 2511
» Reuse in Systems Engineering
Sort
View
SIGMOD
2005
ACM
151views Database» more  SIGMOD 2005»
15 years 10 months ago
The 8 requirements of real-time stream processing
Applications that require real-time processing of high-volume data steams are pushing the limits of traditional data processing infrastructures. These stream-based applications in...
Michael Stonebraker, Ugur Çetintemel, Stanley B. ...
SIGMOD
2003
ACM
136views Database» more  SIGMOD 2003»
15 years 10 months ago
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters
Most relational query optimizers make use of information about the costs of accessing tuples and data structures on various storage devices. This information can at times be off b...
Frederick Reiss, Tapas Kanungo
PODS
2005
ACM
136views Database» more  PODS 2005»
15 years 10 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 7 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
PLDI
2010
ACM
15 years 7 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
« Prev « First page 2440 / 2511 Last » Next »