Sciweavers

833 search results - page 154 / 167
» Wallet Databases with Observers
Sort
View
CAISE
2007
Springer
14 years 4 months ago
Declarative XML Data Cleaning with XClean
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Melanie Weis, Ioana Manolescu
CCS
2007
ACM
14 years 4 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ER
2007
Springer
157views Database» more  ER 2007»
14 years 4 months ago
Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison
Frequently the behaviour of an information system is functionally correct, but it does not meet some quality criteria, such as completeness, consistency, and usability. One way to...
Samira Si-Said Cherfi, Jacky Akoka, Isabelle Comyn...
HPDC
2006
IEEE
14 years 4 months ago
Adaptive I/O Scheduling for Distributed Multi-applications Environments
The aIOLi project aims at optimizing the I/O accesses within the cluster by providing a simple POSIX API, thus avoiding the constraints to use a dedicated parallel I/O library. Th...
Adrien Lebre, Yves Denneulin, Guillaume Huard, Prz...
IISWC
2006
IEEE
14 years 4 months ago
Performance Characterization of SPEC CPU2006 Integer Benchmarks on x86-64 Architecture
— As x86-64 processors become the CPU of choice for the personal computer market, it becomes increasingly important to understand the performance we can expect by migrating appli...
Dong Ye, Joydeep Ray, Christophe Harle, David R. K...