Sciweavers

2272 search results - page 319 / 455
» Validity Invariants and Effects
Sort
View
VLDB
2004
ACM
101views Database» more  VLDB 2004»
15 years 9 months ago
Taming XPath Queries by Minimizing Wildcard Steps
This paper presents a novel and complementary technique to optimize an XPath query by minimizing its wildcard steps. Our approach is based on using a general composite axis called...
Chee Yong Chan, Wenfei Fan, Yiming Zeng
129
Voted
CEC
2003
IEEE
15 years 9 months ago
An evolutionary approach for reducing the switching activity in address buses
In this paper we present two new approaches based on genetic algorithms (GA) to reduce power consumption by communication buses in an embedded system. The first approach makes it ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
COMPSAC
2003
IEEE
15 years 9 months ago
Sensitivity Analysis of Software Reliability for Component-Based Software Applications
The parameters in these software reliability models are usually directly obtained from the field failure data. Due to the dynamic properties of the system and the insufficiency of...
Jung-Hua Lo, Chin-Yu Huang, Sy-Yen Kuo, Michael R....
CSB
2003
IEEE
15 years 9 months ago
Haplotype Motifs: An Algorithmic Approach to Locating Evolutionarily Conserved Patterns in Haploid Sequences
The promise of plentiful data on common human genetic variations has given hope that we will be able to uncover genetic factors behind common diseases that have proven difficult ...
Russell Schwartz
118
Voted
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt