Sciweavers

652 search results - page 65 / 131
» Database Engineering from the Category Theory Viewpoint
Sort
View
VIS
2004
IEEE
124views Visualization» more  VIS 2004»
14 years 10 months ago
Constrained Inverse Volume Rendering for Planetary Nebulae
Determining the three-dimensional structure of distant astronomical objects is a challenging task, given that terrestrial observations provide only one viewpoint. For this task, b...
Charles D. Hansen, Gordon L. Kindlmann, Marcus A. ...
SAC
2009
ACM
14 years 3 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
CCS
2009
ACM
14 years 3 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
KDD
2002
ACM
175views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining product reputations on the Web
Knowing the reputations of your own and/or competitors' products is important for marketing and customer relationship management. It is, however, very costly to collect and a...
Satoshi Morinaga, Kenji Yamanishi, Kenji Tateishi,...
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 9 months ago
Query biased snippet generation in XML search
Snippets are used by almost every text search engine to complement ranking scheme in order to effectively handle user searches, which are inherently ambiguous and whose relevance ...
Yu Huang, Ziyang Liu, Yi Chen