Sciweavers

1811 search results - page 286 / 363
» Facilitation, Systems, and Users: The Complete Socio-Technic...
Sort
View
SIGSOFT
2001
ACM
14 years 8 months ago
Detecting implied scenarios in message sequence chart specifications
Scenario-based specifications such as Message Sequence Charts (MSCs) are becoming increasingly popular as part of a requirements specification. Scenarios describe how system compo...
Jeff Kramer, Jeff Magee, Sebastián Uchitel
ESOP
2008
Springer
13 years 9 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
14 years 9 days ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
11 years 10 months ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
FAST
2008
13 years 10 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...