Results 11 - 20
of
185
Author manuscript, published in "ICDT (2012) 46-60" Highly Expressive Query Languages for Unordered Data Trees ∗
, 2012
"... We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay ..."
Abstract
- Add to MetaCart
We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay
De-indirection for Flash-based Solid State Drives
, 2013
"... ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the ..."
Abstract
- Add to MetaCart
-member the moment when they took me as their student and the joy and hope in my heart. Andrea and Remzi have showed me what systems research is like and how much fun and challenging it can be. Before this journey with them, I had always liked and believed in the beauty of mathematics and theory. My initial interest
1Backing off from Infinity: Performance Bounds via Concentration of Spectral Measure for Random MIMO Channels
"... Abstract—The performance analysis of random vector chan-nels, particularly multiple-input-multiple-output (MIMO) chan-nels, has largely been established in the asymptotic regime of large channel dimensions, due to the analytical intractability of characterizing the exact distribution of the objectiv ..."
Abstract
- Add to MetaCart
Abstract—The performance analysis of random vector chan-nels, particularly multiple-input-multiple-output (MIMO) chan-nels, has largely been established in the asymptotic regime of large channel dimensions, due to the analytical intractability of characterizing the exact distribution
unknown title
"... The potential offered by computer simulation is of-ten not realized: Due to the interaction of system vari-ables, simulation users rarely know how to choose input parameter settings that lead to optimal perfor-mance of a given system. Thus, a program called GenOpt that automatically determines opti ..."
Abstract
- Add to MetaCart
is the main target of GenOpt – the simulation pro-gram usually has text-based I/O. The paper shows how GenOpt’s simulation program interface allows the coupling of any simulation program with text based I/O by simply editing a configuration file, avoiding code modification of the simulation program. By us-ing
unknown title
"... The potential offered by computer simulation is of-ten not realized: Due to the interaction of system vari-ables, simulation users rarely know how to choose input parameter settings that lead to optimal perfor-mance of a given system. Thus, a program called GenOpt that automatically determines opti ..."
Abstract
- Add to MetaCart
is the main target of GenOpt – the simulation pro-gram usually has text-based I/O. The paper shows how GenOpt’s simulation program interface allows the coupling of any simulation program with text based I/O by simply editing a configuration file, avoiding code modification of the simulation program. By us-ing
DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract
- Add to MetaCart
legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup
michaelm(at)eecs.harvard.edu
"... jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key-value store that allows for multiple values to be associated with the same key. We design hashing-based indexing schemes for dictionaries and multimaps that achieve worst-c ..."
Abstract
- Add to MetaCart
-case optimal performance for lookups and updates, with a small or negligible probability the data structure will require a rehash operation, depending on whether we are working in the the external-memory (I/O) model or one of the well-known versions of the Random Access Machine (RAM) model. One of the main
Formal Analysis of a Privacy-Preserving Billing Protocol
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
LumiNet An Organic Interactive Illumination Network Diploma Thesis at the Media Computing Group
"... I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen un ..."
Abstract
- Add to MetaCart
I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen
Results 11 - 20
of
185