Sciweavers

5766 search results - page 983 / 1154
» Reverse Engineering of Data
Sort
View
162
Voted
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 11 months ago
SPROUT: Lazy vs. Eager Query Plans for Tuple-Independent Probabilistic Databases
— A paramount challenge in probabilistic databases is the scalable computation of confidences of tuples in query results. This paper introduces an efficient secondary-storage o...
Dan Olteanu, Jiewen Huang, Christoph Koch
PLDI
2009
ACM
15 years 11 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 11 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
FOSSACS
2009
Springer
15 years 11 months ago
Realizability Semantics of Parametric Polymorphism, General References, and Recursive Types
Abstract. We present a realizability model for a call-by-value, higherorder programming language with parametric polymorphism, general first-class references, and recursive types....
Lars Birkedal, Kristian Støvring, Jacob Tha...
135
Voted
LCTRTS
2009
Springer
15 years 11 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini