Sciweavers

180 search results - page 14 / 36
» How Thorough Is Thorough Enough
Sort
View
SIGMOD
2005
ACM
153views Database» more  SIGMOD 2005»
14 years 7 months ago
Multiple Aggregations Over Data Streams
Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. The need for exploratory IP traffic data analysis naturally leads ...
Rui Zhang 0003, Nick Koudas, Beng Chin Ooi, Divesh...
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
14 years 2 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
BPM
2009
Springer
157views Business» more  BPM 2009»
14 years 2 months ago
An Evaluation Framework for Business Process Management Products
The number of BPM products available has increased substantially in the last years, so that choosing among these products became a difficult task for potential BPM users. This pape...
Stefan R. Koster, Maria-Eugenia Iacob, Luís...
MSS
2000
IEEE
84views Hardware» more  MSS 2000»
13 years 11 months ago
An Overview of Version 0.9.5 Proposed SCSI Device Locks
Symmetric shared disks file systems are functional, versatile, and just plain cool. For these file systems to work, they require a global lock space, acessable to all clients. T...
Andrew P. Barry, Mike Tilstra, Matthew T. O'Keefe,...
CSCW
2000
ACM
13 years 11 months ago
Consistency in replicated continuous interactive media
In this paper we investigate how consistency can be ensured for replicated continuous interactive media, i.e., replicated media which change their state in reaction to user initia...
Martin Mauve