Sciweavers

1239 search results - page 90 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
SIGMOD
2007
ACM
169views Database» more  SIGMOD 2007»
14 years 8 months ago
ConEx: a system for monitoring queries
We present a system, ConEx, for monitoring query execution in a relational database management system. ConEx offers a unified view of query execution, providing continuous visual ...
Chaitanya Mishra, Maksims Volkovs
LREC
2010
188views Education» more  LREC 2010»
13 years 9 months ago
Example-Based Automatic Phonetic Transcription
Current state-of-the-art systems for automatic phonetic transcription (APT) are mostly phone recognizers based on Hidden Markov models (HMMs). We present a different approach for ...
Christina Leitner, Martin Schickbichler, Stefan Pe...
HOTOS
2003
IEEE
14 years 1 months ago
One Hop Lookups for Peer-to-Peer Overlays
Current peer-to-peer lookup algorithms have been designed with the assumption that routing information at each member node must be kept small, so that the bookkeeping required to ...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
ENTCS
2008
140views more  ENTCS 2008»
13 years 8 months ago
Linking Event-B and Concurrent Object-Oriented Programs
The Event-B method is a formal approach to modelling systems, using refinement. Initial specification is a high level of abstraction; detail is added in refinement steps as the de...
Andrew Edmunds, Michael Butler
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li