Sciweavers

1368 search results - page 72 / 274
» The Implicit Pipeline Method
Sort
View
ICFCA
2005
Springer
14 years 3 months ago
Lessons Learned in Applying Formal Concept Analysis to Reverse Engineering
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...
Gabriela Arévalo, Stéphane Ducasse, ...
ECOOP
2008
Springer
13 years 11 months ago
Ptolemy: A Language with Quantified, Typed Events
Implicit invocation (II) and aspect-oriented (AO) languages provide related but distinct mechanisms for separation of concerns. II languages have explicitly announced events that r...
Hridesh Rajan, Gary T. Leavens
CN
2008
162views more  CN 2008»
13 years 10 months ago
A cache-based internet protocol address lookup architecture
This paper proposes a novel Internet Protocol (IP) packet forwarding architecture for IP routers. This architecture is comprised of a non-blocking Multizone Pipelined Cache (MPC) ...
Soraya Kasnavi, Paul Berube, Vincent C. Gaudet, Jo...
SIGIR
2006
ACM
14 years 3 months ago
Learning user interaction models for predicting web search result preferences
Evaluating user preferences of web search results is crucial for search engine development, deployment, and maintenance. We present a real-world study of modeling the behavior of ...
Eugene Agichtein, Eric Brill, Susan T. Dumais, Rob...
SIGMOD
1995
ACM
88views Database» more  SIGMOD 1995»
14 years 1 months ago
Semantic Assumptions and Query Evaluation in Temporal Databases
When querying a temporal database, a user often makes certain semantic assumptions on stored temporal data. This paper formalizes and studies two types of semantic assumptions: po...
Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino...