Sciweavers

601 search results - page 70 / 121
» Writing for the Year 2000
Sort
View
POPL
2005
ACM
16 years 5 days ago
Mutatis mutandis: safe and predictable dynamic software updating
Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynami...
Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman,...
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 3 days ago
Advances in flash memory SSD technology for enterprise database applications
The past few decades have witnessed a chronic and widening imbalance among processor bandwidth, disk capacity, and access speed of disk. According to Amdhal's law, the perfor...
Sang-Won Lee, Bongki Moon, Chanik Park
RTAS
2009
IEEE
15 years 6 months ago
Lightweight Modeling of Complex State Dependencies in Stream Processing Systems
Over the last few years, Real-Time Calculus has been used extensively to model and analyze embedded systems processing continuous data/event streams. Towards this, bounds on the a...
Anne Bouillard, Linh T. X. Phan, Samarjit Chakrabo...
ESWS
2009
Springer
15 years 6 months ago
Relational Databases as Semantic Web Endpoints
This proposal explores the promotion of existing relational databases to Semantic Web Endpoints. It presents the benefits of ontologybased read and write access to existing relati...
Matthias Hert
ASPLOS
2006
ACM
15 years 5 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...