Sciweavers

1575 search results - page 280 / 315
» The provenance of electronic data
Sort
View
ECOOP
1999
Springer
14 years 2 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky
CIKM
2006
Springer
14 years 1 months ago
Annotation propagation revisited for key preserving views
This paper revisits the analysis of annotation propagation from source databases to views defined in terms of conjunctive (SPJ) queries. Given a source database D, an SPJ query Q,...
Gao Cong, Wenfei Fan, Floris Geerts
ICSE
2000
IEEE-ACM
14 years 1 months ago
Little-JIL/Juliette: a process definition language and interpreter
Little-JIL, a language for programming coordination in processes is an executable, high-level language with a formal (yet graphical) syntax and rigorously defined operational seTh...
Aaron G. Cass, Barbara Staudt Lerner, Stanley M. S...
AIRWEB
2008
Springer
13 years 12 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
CSREAESA
2008
13 years 11 months ago
A Middleware for Model-Based Embedded Systems
To deal with the increasing complexity of embedded real-time systems the model-driven development approach has proven to be beneficial. The reduction of complexity achieved by the ...
Wolfgang Haberl, Jan Birke, Uwe Baumgarten