Sciweavers

288 search results - page 53 / 58
» Correct Performance of Transaction Capabilities
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Rapid image retrieval for mobile location recognition
Recognizing the location and orientation of a mobile device from captured images is a promising application of image retrieval algorithms. Matching the query images to an existing...
Georg Schroth, Anas Al-Nuaimi, Robert Huitl, Flori...
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
14 years 8 months ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Refactoring for Parameterizing Java Classes
Type safety and expressiveness of many existing Java libraries and their client applications would improve, if the libraries were upgraded to define generic classes. Efficient and...
Adam Kiezun, Michael D. Ernst, Frank Tip, Robert M...
ICDE
2010
IEEE
539views Database» more  ICDE 2010»
14 years 7 months ago
Impact of Disk Corruption on Open-Source DBMS
Abstract-- Despite the best intentions of disk and RAID manufacturers, on-disk data can still become corrupted. In this paper, we examine the effects of corruption on database mana...
Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan...
CCS
2010
ACM
14 years 2 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall