Sciweavers

422 search results - page 84 / 85
» Risk management for distributed authorization
Sort
View
CSCW
2011
ACM
13 years 1 months ago
"Not my bug!" and other reasons for software bug report reassignments
Bug reporting/fixing is an important social part of the software development process. The bug-fixing process inherently has strong inter-personal dynamics at play, especially in h...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
13 years 1 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
CHI
2011
ACM
12 years 9 months ago
CommentSpace: structured support for collaborative visual analysis
Collaborative visual analysis tools can enhance sensemaking by facilitating social interpretation and parallelization of effort. These systems enable distributed exploration and e...
Wesley Willett, Jeffrey Heer, Joseph M. Hellerstei...
EDBT
2011
ACM
199views Database» more  EDBT 2011»
12 years 9 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
SIGMOD
2012
ACM
203views Database» more  SIGMOD 2012»
11 years 8 months ago
Optimizing index for taxonomy keyword search
Query substitution is an important problem in information retrieval. Much work focuses on how to find substitutes for any given query. In this paper, we study how to efficiently ...
Bolin Ding, Haixun Wang, Ruoming Jin, Jiawei Han, ...