Sciweavers

1024 search results - page 160 / 205
» High-Level Execution Time Analysis
Sort
View
SAINT
2005
IEEE
14 years 4 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
VLDB
2004
ACM
113views Database» more  VLDB 2004»
14 years 4 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
CAIP
1999
Springer
145views Image Analysis» more  CAIP 1999»
14 years 3 months ago
Optimized Fast Algorithms for the Quaternionic Fourier Transform
Abstract. In this article, we deal with fast algorithms for the quaternionic Fourier transform (QFT). Our aim is to give a guideline for choosing algorithms in practical cases. Hen...
Michael Felsberg, Gerald Sommer
ISSTA
2007
ACM
14 years 16 days ago
Experimental assessment of random testing for object-oriented software
Progress in testing requires that we evaluate the effectiveness of testing strategies on the basis of hard experimental evidence, not just intuition or a priori arguments. Random ...
Ilinca Ciupa, Andreas Leitner, Manuel Oriol, Bertr...
BIS
2007
124views Business» more  BIS 2007»
14 years 14 days ago
Evaluating Quality of Web Services: A Risk-Driven Approach
Abstract. Composing existing web services to obtain new functionalities is important for e-business applications. Deficiencies of aggregated web services can be compensated involv...
Natallia Kokash, Vincenzo D'Andrea