Information management applications exhibit a wide range of query performance and result freshness goals. Some applications, such as web search, require interactive performance, b...
Kimberly Keeton, Charles B. Morrey III, Craig A. N...
The selection of users for participation in IT projects involves trade-offs between multiple criteria, one of which is selecting a representative cross-section of users. This crite...
Rasmus Rasmussen, Anders S. Christensen, Tobias Fj...
We study modular, automatic code generation from hierarchical block diagrams with synchronous semantics. Such diagrams are the fundamental model behind widespread tools in the emb...
Roberto Lublinerman, Christian Szegedy, Stavros Tr...
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...