Sciweavers

2606 search results - page 396 / 522
» cost 2008
Sort
View
SCAM
2008
IEEE
14 years 4 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
SEUS
2008
IEEE
14 years 4 months ago
Delay-Aware Mobile Transactions
In the expanding e-society, mobile embedded systems are increasingly used to support transactions such as for banking, stock or database applications. Such systems entail a range o...
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
SRDS
2008
IEEE
14 years 4 months ago
Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery Systems
The efficiency of service discovery is critical in the development of fully decentralized middleware intended to manage large scale computational grids. This demand influenced t...
Eddy Caron, Ajoy Kumar Datta, Franck Petit, C&eacu...
SSDBM
2008
IEEE
113views Database» more  SSDBM 2008»
14 years 4 months ago
Query Selectivity Estimation for Uncertain Data
Applications requiring the handling of uncertain data have led to the development of database management systems extending the scope of relational databases to include uncertain (p...
Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil ...
SSDBM
2008
IEEE
115views Database» more  SSDBM 2008»
14 years 4 months ago
Breaking the Curse of Cardinality on Bitmap Indexes
Bitmap indexes are known to be efficient for ad-hoc range queries that are common in data warehousing and scientific applications. However, they suffer from the curse of cardina...
Kesheng Wu, Kurt Stockinger, Arie Shoshani