Sciweavers

5344 search results - page 1055 / 1069
» Privacy-Preserving Set Operations
Sort
View
OOPSLA
2010
Springer
13 years 8 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
PVLDB
2010
112views more  PVLDB 2010»
13 years 8 months ago
Querying Probabilistic Information Extraction
Recently, there has been increasing interest in extending relational query processing to include data obtained from unstructured sources. A common approach is to use stand-alone I...
Daisy Zhe Wang, Michael J. Franklin, Minos N. Garo...
PVLDB
2010
128views more  PVLDB 2010»
13 years 8 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
TCOM
2010
91views more  TCOM 2010»
13 years 8 months ago
Slot-wise maximum likelihood estimation of the tag population size in FSA protocols
Abstract—Framed Slotted Aloha (FSA) is a popular anticollision technique in state-of-the-art RF-ID systems, as in ISO/IEC CD 18000-6 for 900MHz or the EPCglobal HF Gen 2 draft fo...
Bastian Knerr, Martin Holzer 0002, Christoph Anger...
TVCG
2010
147views more  TVCG 2010»
13 years 8 months ago
"behaviorism": a framework for dynamic data visualization
— While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction tec...
Angus Forbes, Tobias Höllerer, George Legrady
« Prev « First page 1055 / 1069 Last » Next »