Sciweavers

3381 search results - page 515 / 677
» adaptive 2007
Sort
View
188
Voted
VLDB
2007
ACM
105views Database» more  VLDB 2007»
16 years 1 months ago
Using a distributed quadtree index in peer-to-peer networks
Abstract Peer-to-peer (P2P) networks have become a powerful means for online data exchange. Currently, users are primarily utilizing these networks to perform exact-match queries a...
Egemen Tanin, Aaron Harwood, Hanan Samet
163
Voted
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
16 years 29 days ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
ICSE
2007
IEEE-ACM
16 years 27 days ago
Formal Software Analysis Emerging Trends in Software Model Checking
The study of methodologies and techniques to produce correct software has been active for four decades. During this period, researchers have developed and investigated a wide vari...
Matthew B. Dwyer, John Hatcliff, Robby, Corina S. ...
93
Voted
ICSE
2007
IEEE-ACM
16 years 27 days ago
Empirical Methods in Software Engineering Research
The popularity of empirical methods in software engineering research is on the rise. Surveys, experiments, metrics, case studies, and field studies are examples of empirical method...
Walter F. Tichy, Frank Padberg
106
Voted
ICSE
2007
IEEE-ACM
16 years 27 days ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...