Sciweavers

1075 search results - page 133 / 215
» Toward a Verified Relational Database Management System
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
CHI
1999
ACM
14 years 1 months ago
Principles of Mixed-Initiative User Interfaces
Recent debate has centered on the relative promise of focusing user-interface research on developing new metaphors and tools that enhance users’ abilities to directly manipulate...
Eric Horvitz
SIGMOD
2011
ACM
150views Database» more  SIGMOD 2011»
12 years 11 months ago
WHAM: a high-throughput sequence alignment method
Over the last decade the cost of producing genomic sequences has dropped dramatically due to the current so called “next-gen” sequencing methods. However, these next-gen seque...
Yinan Li, Allison Terrell, Jignesh M. Patel
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 1 months ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden
SIGMOD
2003
ACM
88views Database» more  SIGMOD 2003»
14 years 9 months ago
Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
We consider the problem of mapping data in peer-topeer data-sharing systems. Such systems often rely on the use of mapping tables listing pairs of corresponding values to search f...
Anastasios Kementsietsidis, Marcelo Arenas, Ren&ea...