Sciweavers

771 search results - page 102 / 155
» Access Methods and Query Processing Techniques
Sort
View
CATS
2008
13 years 11 months ago
Verifying Michael and Scott's Lock-Free Queue Algorithm using Trace Reduction
Lock-free algorithms have been developed to avoid various problems associated with using locks to control access to shared data structures. These algorithms are typically more int...
Lindsay Groves
INLG
2010
Springer
13 years 7 months ago
Generating Natural Language Descriptions of Z Test Cases
Critical software most often requires an independent validation and verification (IVV). IVV is usually performed by domain experts, who are not familiar with specific, many times ...
Maximiliano Cristiá, Brian Plüss
SIGMOD
1996
ACM
132views Database» more  SIGMOD 1996»
14 years 2 months ago
Cost-Based Optimization for Magic: Algebra and Implementation
Magic sets rewriting is a well-known optimization heuristic for complex decision-support queries. There can be many variants of this rewriting even for a single query, which diffe...
Praveen Seshadri, Joseph M. Hellerstein, Hamid Pir...
SIGIR
2010
ACM
14 years 1 months ago
Positional relevance model for pseudo-relevance feedback
Pseudo-relevance feedback is an effective technique for improving retrieval results. Traditional feedback algorithms use a whole feedback document as a unit to extract words for ...
Yuanhua Lv, ChengXiang Zhai
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
13 years 10 months ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...