Sciweavers

2487 search results - page 370 / 498
» cases 2009
Sort
View
111
Voted
CIDR
2009
105views Algorithms» more  CIDR 2009»
15 years 1 months ago
Teaching an Old Elephant New Tricks
In recent years, column stores (or C-stores for short) have emerged as a novel approach to deal with read-mostly data warehousing applications. Experimental evidence suggests that...
Nicolas Bruno
95
Voted
CIDR
2009
136views Algorithms» more  CIDR 2009»
15 years 1 months ago
The Role of Schema Matching in Large Enterprises
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...
106
Voted
COLOGNETWENTE
2009
15 years 1 months ago
Acyclic and Frugal Colourings of Graphs
Given a graph G = (V, E), a proper vertex colouring of V is t-frugal if no colour appears more than t times in any neighbourhood and is acyclic if each of the bipartite graphs con...
Ross J. Kang, Tobias Müller
DAIS
2009
15 years 1 months ago
Fault-Tolerant Aggregation by Flow Updating
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 1 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald