Sciweavers

653 search results - page 47 / 131
» Enhancing Commitment Machines
Sort
View
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 4 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 4 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
IAT
2006
IEEE
14 years 4 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
ICDE
2006
IEEE
185views Database» more  ICDE 2006»
14 years 4 months ago
Don't be a Pessimist: Use Snapshot based Concurrency Control for XML
Currently, only few XML data management systems support concurrent access to an XML document, and if they do, they typically apply variations of hierarchical locking to handle XML...
Zeeshan Sardar, Bettina Kemme
MSR
2006
ACM
14 years 4 months ago
Where is bug resolution knowledge stored?
ArgoUML uses both CVS and Bugzilla to keep track of bugfixing activities since 1998. A common practice is to reference source code changes resolving a bug stored in Bugzilla by i...
Gerardo Canfora, Luigi Cerulo