Sciweavers

6202 search results - page 1218 / 1241
» Without Loss of Generality
Sort
View
PODS
2011
ACM
238views Database» more  PODS 2011»
14 years 23 days ago
Beyond simple aggregates: indexing for summary queries
Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
Zhewei Wei, Ke Yi
SAC
2011
ACM
14 years 22 days ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
SAC
2011
ACM
14 years 22 days ago
ImageAlert: credibility analysis of text-image pairs on the web
Although the Web lets users freely browse and publish information, most Web information is unauthorized in contrast to conventional mass media. Therefore, it is not always credibl...
Yusuke Yamamoto, Katsumi Tanaka
GIS
2006
ACM
14 years 10 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
SAC
2011
ACM
14 years 22 days ago
An empirical study on the effectiveness of time-aware test case prioritization techniques
Regression testing is often performed with a time budget and it does not allow executing all test cases. Test case prioritization techniques re-order test cases to increase the ra...
Dongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Ch...
« Prev « First page 1218 / 1241 Last » Next »