Sciweavers

1543 search results - page 247 / 309
» Using a Groupware Space for Distributed Requirements Enginee...
Sort
View
ICDE
2002
IEEE
204views Database» more  ICDE 2002»
14 years 10 months ago
Approximating a Data Stream for Querying and Estimation: Algorithms and Performance Evaluation
Obtaining fast and good quality approximations to data distributions is a problem of central interest to database management. A variety of popular database applications including,...
Sudipto Guha, Nick Koudas
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 3 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
ACMSE
2009
ACM
14 years 3 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 1 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang
ICSE
2009
IEEE-ACM
14 years 9 months ago
TranStrL: An automatic need-to-translate string locator for software internationalization
Software internationalization is often necessary when distributing software applications to different regions around the world. In many cases, developers often do not internationa...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...