Sciweavers

26354 search results - page 90 / 5271
» How we refactor, and how we know it
Sort
View
ACL
2012
11 years 11 months ago
How Are Spelling Errors Generated and Corrected? A Study of Corrected and Uncorrected Spelling Errors Using Keystroke Logs
This paper presents a comparative study of spelling errors that are corrected as you type, vs. those that remain uncorrected. First, we generate naturally occurring online error c...
Yukino Baba, Hisami Suzuki
SIGMOD
2008
ACM
158views Database» more  SIGMOD 2008»
14 years 9 months ago
Column-stores vs. row-stores: how different are they really?
There has been a significant amount of excitement and recent work on column-oriented database systems ("column-stores"). These database systems have been shown to perfor...
Daniel J. Abadi, Samuel Madden, Nabil Hachem
EDBT
2009
ACM
195views Database» more  EDBT 2009»
14 years 3 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...
SOUPS
2009
ACM
14 years 3 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
INFOCOM
2002
IEEE
14 years 2 months ago
How to market-manage a QoS network
This paper describes a control mechanism for a future Internet. It is an economic mechanism that enables users to choose different pairs of price/QoS priority levels for network se...
Jörn Altmann, Huw Oliver, Hans Daanen, Alfons...