Sciweavers

2714 search results - page 368 / 543
» Under the table interaction
Sort
View
KDD
2009
ACM
143views Data Mining» more  KDD 2009»
16 years 4 months ago
Optimizing web traffic via the media scheduling problem
Website traffic varies through time in consistent and predictable ways, with highest traffic in the middle of the day. When providing media content to visitors, it is important to...
Lars Backstrom, Jon M. Kleinberg, Ravi Kumar
POPL
2008
ACM
16 years 4 months ago
A theory of contracts for web services
Contracts are behavioural descriptions of Web services. We devise a theory of contracts that formalises the compatibility of a client to a service, and the safe replacement of a s...
Giuseppe Castagna, Nils Gesbert, Luca Padovani
OSDI
2008
ACM
16 years 4 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
VLDB
2007
ACM
190views Database» more  VLDB 2007»
16 years 4 months ago
Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concur
This paper focuses on the problem of improving distributed query throughput of the RDBMS-based data integration system that has to inherit the query execution model of the underly...
Rubao Lee, Minghong Zhou, Huaming Liao
SIGMOD
2007
ACM
112views Database» more  SIGMOD 2007»
16 years 4 months ago
A random walk approach to sampling hidden databases
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden backend database to provide answers to user queries. ...
Arjun Dasgupta, Gautam Das, Heikki Mannila