Sciweavers

623 search results - page 95 / 125
» An Empirical Study of Query Specificity
Sort
View
TCAD
2002
118views more  TCAD 2002»
13 years 7 months ago
Application-specific clustered VLIW datapaths: early exploration on a parameterized design space
Specialized clustered very large instruction word (VLIW) processors combined with effective compilation techniques enable aggressive exploitation of the high instruction-level para...
Viktor S. Lapinskii, Margarida F. Jacome, Gustavo ...
SBMF
2010
Springer
129views Formal Methods» more  SBMF 2010»
13 years 2 months ago
Directed Model Checking for B: An Evaluation and New Techniques
ProB is a model checker for high-level formalisms such as B, Event-B, CSP and Z. ProB uses a mixed depth-first/breadth-first search strategy, and in previous work we have argued th...
Michael Leuschel, Jens Bendisposto
SIGSOFT
2006
ACM
14 years 8 months ago
Questions programmers ask during software evolution tasks
Though many tools are available to help programmers working on change tasks, and several studies have been conducted to understand how programmers comprehend systems, little is kn...
Jonathan Sillito, Gail C. Murphy, Kris De Volder
WWW
2009
ACM
14 years 8 months ago
Exploiting web search engines to search structured databases
Web search engines often federate many user queries to relevant structured databases. For example, a product related query might be federated to a product database containing thei...
Arnd Christian König, Dong Xin, Kaushik Chakr...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 8 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias