Sciweavers

1045 search results - page 115 / 209
» The Use of Exceptions
Sort
View
VLDB
2005
ACM
121views Database» more  VLDB 2005»
14 years 1 months ago
Online Estimation For Subset-Based SQL Queries
The largest databases in use today are so large that answering a query exactly can take minutes, hours, or even days. One way to address this problem is to make use of approximati...
Chris Jermaine, Alin Dobra, Abhijit Pol, Shantanu ...
VLDB
2004
ACM
101views Database» more  VLDB 2004»
14 years 1 months ago
Taming XPath Queries by Minimizing Wildcard Steps
This paper presents a novel and complementary technique to optimize an XPath query by minimizing its wildcard steps. Our approach is based on using a general composite axis called...
Chee Yong Chan, Wenfei Fan, Yiming Zeng
DSN
2003
IEEE
14 years 1 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
MTV
2003
IEEE
154views Hardware» more  MTV 2003»
14 years 1 months ago
Tuning the VSIDS Decision Heuristic for Bounded Model Checking
Bounded Model Checking (BMC) techniques have been used for formal hardware verification, with the help of tools such as GRASP (Generic search Algorithm for Satisfiability Proble...
Ohad Shacham, Emmanuel Zarpas
EWSPT
2003
Springer
14 years 1 months ago
Formalizing Rework in Software Processes
Abstract. This paper indicates how effective software-process programming languages can lead to improved understandings of critical software processes, as well as improved process ...
Aaron G. Cass, Stanley M. Sutton Jr., Leon J. Oste...