Sciweavers

337 search results - page 50 / 68
» Guiding the Application of Design Patterns Based on UML Mode...
Sort
View
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
14 years 6 days ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
ENTCS
2010
118views more  ENTCS 2010»
13 years 6 months ago
Systematic Refinement of Performance Models for Concurrent Component-based Systems
Model-driven performance prediction methods require detailed design models to evaluate the performance of software systems during early development stages. However, the complexity...
Lucia Kapová, Steffen Becker
SAC
2006
ACM
14 years 2 months ago
Digital geometry image analysis for medical diagnosis
This paper describes a new medical image analysis technique for polygon mesh surfaces of human faces for a medical diagnosis application. The goal is to explore the natural patter...
Jiandong Fang, Shiaofen Fang, Jeffrey Huang, Mihra...
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
11 years 11 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr
ANCS
2006
ACM
14 years 11 days ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo