Sciweavers

3686 search results - page 730 / 738
» Comprehensive comprehensions
Sort
View
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
SAC
2011
ACM
12 years 11 months ago
Type harvesting: a practical approach to obtaining typing information in dynamic programming languages
Dynamically typed programming languages are powerful tools for rapid software development. However, there are scenarios that would benefit from actual type information being avai...
Michael Haupt, Michael Perscheid, Robert Hirschfel...
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
12 years 11 months ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 11 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...