Sciweavers

1683 search results - page 72 / 337
» A Needed Narrowing Strategy
Sort
View
SSR
1997
67views more  SSR 1997»
13 years 11 months ago
Open Implementation Analysis and Design
This paper describes a methodology for designing Open Implementations -- software modules that can adapt or change their internals to accommodate the needs of different clients. A...
Chris Maeda, Arthur Lee, Gail C. Murphy, Gregor Ki...
REPLICATION
2010
13 years 8 months ago
Replicating for Performance: Case Studies
In this chapter we take a look at the application of replication techniques for building scalable distributed systems. Unlike using replication for attaining dependability, replica...
Maarten van Steen, Guillaume Pierre
SIGMOD
2008
ACM
122views Database» more  SIGMOD 2008»
14 years 10 months ago
Building query optimizers for information extraction: the SQoUT project
Text documents often embed data that is structured in nature. This structured data is increasingly exposed using information extraction systems, which generate structured relation...
Alpa Jain, Panagiotis G. Ipeirotis, Luis Gravano
CEC
2009
IEEE
14 years 4 months ago
Multi-start JADE with knowledge transfer for numerical optimization
— JADE is a recent variant of Differential Evolution (DE) for numerical optimization, which has been reported to obtain some promising results in experimental study. However, we ...
Fei Peng, Ke Tang, Guoliang Chen, Xin Yao
ICSM
2009
IEEE
14 years 4 months ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen