Sciweavers

8322 search results - page 1507 / 1665
» What Are We Looking for
Sort
View
ICDE
2010
IEEE
217views Database» more  ICDE 2010»
14 years 5 months ago
Toward industrial-strength keyword search systems over relational data
– Keyword search (KWS) over relational data, where the answers are multiple tuples connected via joins, has received significant attention in the past decade. Numerous solutions ...
Akanksha Baid, Ian Rae, AnHai Doan, Jeffrey F. Nau...
ISQED
2010
IEEE
141views Hardware» more  ISQED 2010»
14 years 5 months ago
Assessing chip-level impact of double patterning lithography
—Double patterning lithography (DPL) provides an attractive alternative or a supplementary method to enable the 32nm and 22nm process nodes, relative to costlier technology optio...
Kwangok Jeong, Andrew B. Kahng, Rasit Onur Topalog...
TEI
2010
ACM
170views Hardware» more  TEI 2010»
14 years 5 months ago
Swing that thing: moving to move
Swing That Thing… is a practice-based doctoral research project that examines how technology in on and around the body might be used to poeticise experience. Outcomes include a ...
Danielle Wilde
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 5 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
SENSYS
2009
ACM
14 years 5 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
« Prev « First page 1507 / 1665 Last » Next »