Sciweavers

1024 search results - page 69 / 205
» Value complete, column complete, predicate complete
Sort
View
ISCA
2002
IEEE
93views Hardware» more  ISCA 2002»
15 years 6 months ago
Transient-Fault Recovery Using Simultaneous Multithreading
We propose a scheme for transient-fault recovery called Simultaneously and Redundantly Threaded processors with Recovery (SRTR) that enhances a previously proposed scheme for tran...
T. N. Vijaykumar, Irith Pomeranz, Karl Cheng
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 1 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
DBPL
1993
Springer
125views Database» more  DBPL 1993»
15 years 5 months ago
Octopus: A Reflective Language Mechanism for Object Manipulation
A class of database programs exist which are required to operate over an infinite number of types; included in this class are object browsers and query tools. The types over which...
Alex Farkas, Alan Dearle
146
Voted
HIS
2003
15 years 3 months ago
A Hybrid Approach for Learning Parameters of Probabilistic Networks from Incomplete Databases
– Probabilistic Inference Networks are becoming increasingly popular for modeling and reasoning in uncertain domains. In the past few years, many efforts have been made in learni...
S. Haider
CHI
2007
ACM
16 years 2 months ago
Endpoint prediction using motion kinematics
Recently proposed novel interaction techniques such as cursor jumping [1] and target expansion for tiled arrangements [13] are predicated on an ability to effectively estimate the...
Edward Lank, Yi-Chun Nikko Cheng, Jaime Ruiz