Sciweavers

9842 search results - page 1825 / 1969
» Compositional timing analysis
Sort
View
SIGSOFT
2007
ACM
14 years 11 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
ISBI
2008
IEEE
14 years 11 months ago
Multiresolution identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cell
We propose a system for identification of germ layer components in teratomas derived from human and nonhuman primate embryonic stem cells. Tissue regeneration and repair, drug tes...
Amina Chebira, John A. Ozolek, Carlos A. Castro, W...
ICDT
2009
ACM
147views Database» more  ICDT 2009»
14 years 11 months ago
The average-case complexity of counting distinct elements
We continue the study of approximating the number of distinct elements in a data stream of length n to within a (1? ) factor. It is known that if the stream may consist of arbitra...
David P. Woodruff
WWW
2009
ACM
14 years 11 months ago
Data quality in web archiving
Web archives preserve the history of Web sites and have high long-term value for media and business analysts. Such archives are maintained by periodically re-crawling entire Web s...
Marc Spaniol, Dimitar Denev, Arturas Mazeika, Gerh...
WWW
2009
ACM
14 years 11 months ago
General auction mechanism for search advertising
In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the pag...
Dávid Pál, Gagan Aggarwal, Martin P&...
« Prev « First page 1825 / 1969 Last » Next »