Filters








13 Hits in 5.2 sec

Learning to Drive on the Wrong Side of the Road: How American Computing Came to Rely on Conferences for Primary Publication [article]

Elijah Bouma-Sims
2021 arXiv   pre-print
In contrast to other fields where conferences are typically for less polished or in-progress research, computing has long relied on referred conference papers as a venue for the final publication of completed  ...  economically optimal one" allowed conferences to gain and hold prominence as the field exploded in popularity during the 1980s.  ...  AndrewDelano Abbott, The system of professions : an essay on the division of expert labor (Chicago, Illinois: University of Chicago Press, 1988) pg. 8 20.  ... 
arXiv:2109.06438v1 fatcat:pbe7s6axkfapxcwupofmd4rzuy

Introduction to the IEEE Transactions on Cloud Computing

Rajkumar Buyya
2013 IEEE Transactions on Cloud Computing  
Varela is an associate editor and information director of the ACM Computing Surveys journal, and has served as a guest editor of the Scientific Programming journal.  ...  Carlos Varela received the BS degree with honors, and MS and PhD degrees in computer science from the University of Illinois at Urbana-Champaign. Dr.  ...  He has been on the program committees of numerous leading international conferences, including SIGMOD, VLDB, ICDE, WWW, and ACM Multimedia.  ... 
doi:10.1109/tcc.2013.13 fatcat:j7z2ihzdhfbgnc2ilfhhw4deqe

A general overview and bibliometric analysis of seven ACM hypertext and web conferences

Swati Agarwal, Nitish Mittal, Ashish Sureka
2017 International Journal of Web Engineering and Technology  
In this study, we performed an in-depth bibliometric, scientometric and exploratory analysis of ACM SIGWEB sponsored conferences by visually analysing the DBLP database.  ...  Collectively, SIGWEB conferences have a higher hosting rate and local community participation in places where the USA and Europe make the greatest conference contributions.  ...  Nascimento et al. (2003) investigated the co-authorship graph obtained from all papers published at SIGMOD (the ACM Special Interest Group on Management of Data) between the year 1975 and 2002.  ... 
doi:10.1504/ijwet.2017.088376 fatcat:x52guzmov5ejzaznn3zow25an4

A general framework for the optimization of object-oriented queries

Sophie Cluet, Claude Delobel
1992 Proceedings of the 1992 ACM SIGMOD international conference on Management of data - SIGMOD '92  
As a first step, we focus essentially on the logical aspect of query optimization.  ...  The goal of this work is to integrate in a general framework the dHferent query optimization techniques that have been proposed in the object-oriented context.  ...  Indexing Techniques for Queries on Nested Objects, IEEE Transaction Knowledge and Date Engineering, SIGMOD, Chicago, Illinois, USA, 1988. S. Cluet.  ... 
doi:10.1145/130283.130341 dblp:conf/sigmod/CluetD92 fatcat:munqwia7qbgjxeqggxeaaras7i

Elaboration d'entrepôts de données complexes [article]

Olivier Teste
2010 arXiv   pre-print
We provide an object-oriented data warehouse model allowing data warehouse description as a central repository of relevant, complex and temporal data.  ...  Each warehouse object is composed of one current state, several past states (modelling its detailed evolutions) and several archive states (modelling its evolutions within a summarised form).  ...  J., Livny M., Jauhari R., "The HiPAC Project: Combining Active Databases and Timing Constraints", ACM SIGMOD Record, 17(3), Chicago (Illinois, USA), 1988.  ... 
arXiv:1005.0220v1 fatcat:3temgq2jmngcpen5latfn6xuzy

Outlier Detection, Spatial [chapter]

Yufeng Kou, Chang-Tien Lu
2017 Encyclopedia of GIS  
required for the representation of the full domain of data.  ...  The use of the Constraint data type permits the abstraction to use the data in the same sense as in the relational databases, where the same type of data can be used for different semantics.  ...  Acknowledgements This work has been partially funded by the Ministry of Science and Technology of Spain (TIN2015-63502-C3-2-R) and the European Regional Development Fund (ERDF/FEDER).  ... 
doi:10.1007/978-3-319-17885-1_945 fatcat:p5vw3xpawfeh3jjib5qpqyjlo4

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
In Proceedings of the ACM SIGMOD International Conference on Management of Data, (June 1988), 109-116. 30. pinheiro, e., Weber, W.  ...  The original version of this paper was published in the Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2009. 94 communications of th e ac m | n ov  ...  Applicants must send: 1) statements on teaching, research, and interest/qualifications for this position, 2) a copy of their graduate transcript, 3) a curriculum vita, and 4) names and contact information  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y

Crawler [chapter]

Kenneth A. Ross, Christian S. Jensen, Richard Snodgrass, Curtis E. Dyreson, Christian S. Jensen, Richard Snodgrass, Spiros Skiadopoulos, Cristina Sirangelo, Mary Lynette Larsgaard, Gösta Grahne, Daniel Kifer, Hans-Arno Jacobsen (+106 others)
2009 Encyclopedia of Database Systems  
For such workloads, improving the locality of data-intensive operations can have a direct impact on the system's overall performance.  ...  As a result, it is common (at the time of writing) for data accesses to RAM to require several hundred CPU cycles to resolve.  ...  ACM SIGMOD Int. Conf. on Management of Data, 1995, pp. 47-58. Comprehension syntax. ACM SIGMOD Rec., 23(1):87-96, 1994. 2.  ... 
doi:10.1007/978-0-387-39940-9_2315 fatcat:x4qspjdytvhvroc7h753dihp7u

Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

S. Navaneethan
2013 IOSR Journal of Computer Engineering  
discovery in data mining, pp. 562 – 567, Chicago, Illinois, USA, 2005. [2] R.  ...  References: [1] Shengnan Cong, Jiawei Han and David Padua, "Parallel Mining Of Closed Sequential Patterns", in Proceedings of the eleventh ACM SIGKDD international conference on Knowledge  ... 
doi:10.9790/0661-0850103 fatcat:ju24fypkjvgdzcg3ajc6hkto4u

An International Journal of Computinj and Informatics Integration Multidatabase Model Software Reliability Control Disk Mirroring Parallel Gaussian Elimination Deep Knowledge

Jerzy Nawrocki
unpublished
Blocking is avoided by imposing the restriction that only one type of transaction can write to a particular data object, and by using a non-blocking access mechanism.  ...  Data itself is considered to he either perishable or non-perishable. Various implementations of Gaussian elimination of dense matrices on an 8-processor Cray Y-MP are discussed.  ...  Acknowledgements The authors are sincerely thankful to the anonymous referees for making several helpful comments and suggestions on earlier versions of the paper, and to Angelica Kokkinaki for the valuable  ... 
fatcat:pcr7t3j74jf4ras6s7mocdbimq

Linear Scalability of Distributed Applications

Nicolas Bonvin
2011
In Proceedings of the 2011 international conference on Management of data, SIGMOD ’11, pages 325–336, New York, NY, USA, 2011. ACM. [110] D. Karger, E. Lehman, T. Leighton, M. Levine, D.  ...  In Proc. of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2009. [68] E. A. Brewer. Towards robust distributed systems (abstract).  ... 
doi:10.5075/epfl-thesis-5278 fatcat:cqwluzkzojgozb362zlaxt3z4e

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgments Acknowledgment The author acknowledges support by VEGA 1/0259/13.  ...  Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant  ...  Shulman-Peleg, "Proofs of ownership in remote storage systems", in Proceedings of the Proceedings of the 18th ACM conference on Computer and Communications Security, pp. 491-500, Chicago, Illinois, USA  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

UKnowledge Social Space and Social Media: Analyzing Urban Space with Big Data

Ate Poorthuis
unpublished
Presented at the the fourth international conference, New York, New York, USA: ACM. http://doi.org/10.1145/1556460.1556497 Smith, N. (2006, June 11). There’s No Such Thing as a Natural Disaster.  ...  NoSQL databases: MongoDB vs cassandra. the International C* Conference (pp. 14–22). New York, New York, USA: ACM. http://doi. org/10.1145/2494444.2494447 Agneessens, F., & Everett, M.  ... 
fatcat:t3xyhitqnzhm3jtbf4jmwaqrwy