Sciweavers

264 search results - page 43 / 53
» Source-Based Trace Exploration
Sort
View
98
Voted
DAGSTUHL
2006
15 years 4 months ago
Closure and Causality
We present a model of causality which is defined by the intersection of two distinct closure systems, I and T . To present empirical evidence to demonstrate that this model has pra...
John L. Pfaltz
132
Voted
FAST
2003
15 years 3 months ago
Using MEMS-Based Storage in Disk Arrays
Current disk arrays, the basic building blocks of highperformance storage systems, are built around two memory technologies: magnetic disk drives, and non-volatile DRAM caches. Di...
Mustafa Uysal, Arif Merchant, Guillermo A. Alvarez
SSWMC
2004
15 years 3 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
123
Voted
CIDR
2009
157views Algorithms» more  CIDR 2009»
15 years 3 months ago
Capturing Data Uncertainty in High-Volume Stream Processing
We present the design and development of a data stream system that captures data uncertainty from data collection to query processing to final result generation. Our system focuse...
Yanlei Diao, Boduo Li, Anna Liu, Liping Peng, Char...
125
Voted
POPL
2010
ACM
15 years 2 months ago
Nested interpolants
In this paper, we explore the potential of the theory of nested words for partial correctness proofs of recursive programs. Our conceptual contribution is a simple framework that ...
Matthias Heizmann, Jochen Hoenicke, Andreas Podels...