Sciweavers

217 search results - page 29 / 44
» Query Execution Techniques for Caching Expensive Methods
Sort
View
PSTV
1992
113views Hardware» more  PSTV 1992»
13 years 9 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
VLDB
2002
ACM
108views Database» more  VLDB 2002»
13 years 8 months ago
Generic Database Cost Models for Hierarchical Memory Systems
Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in ...
Stefan Manegold, Peter A. Boncz, Martin L. Kersten
CIKM
2006
Springer
14 years 6 days ago
Structure-based querying of proteins using wavelets
The ability to retrieve molecules based on structural similarity has use in many applications, from disease diagnosis and treatment to drug discovery and design. In this paper, we...
Keith Marsolo, Srinivasan Parthasarathy, Kotagiri ...
ICCSA
2007
Springer
14 years 2 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
SIGMOD
1999
ACM
98views Database» more  SIGMOD 1999»
14 years 23 days ago
Self-tuning Histograms: Building Histograms Without Looking at Data
In this paper, we introduce self-tuning histograms. Although similar in structure to traditional histograms, these histograms infer data distributions not by examining the data or...
Ashraf Aboulnaga, Surajit Chaudhuri