Sciweavers

15372 search results - page 2884 / 3075
» The Semantics of Semantic Annotation
Sort
View
132
Voted
SPAA
2009
ACM
16 years 1 months ago
A lightweight in-place implementation for software thread-level speculation
Thread-level speculation (TLS) is a technique that allows parts of a sequential program to be executed in parallel. TLS ensures the parallel program's behaviour remains true ...
Cosmin E. Oancea, Alan Mycroft, Tim Harris
SAS
2009
Springer
214views Formal Methods» more  SAS 2009»
16 years 1 months ago
Abstract Interpretation of FIFO Replacement
Interpretation of FIFO Replacement Daniel Grund and Jan Reineke Saarland University, Saarbr?ucken, Germany In hard real-time systems, the execution time of programs must be bounded...
Daniel Grund, Jan Reineke
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 1 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
16 years 1 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
185
Voted
PODS
2009
ACM
86views Database» more  PODS 2009»
16 years 1 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
« Prev « First page 2884 / 3075 Last » Next »