Sciweavers

1029 search results - page 37 / 206
» Dependence Anti Patterns
Sort
View
WWW
2007
ACM
14 years 8 months ago
Estimating the cardinality of RDF graph patterns
Most RDF query languages allow for graph structure search through a conjunction of triples which is typically processed using join operations. A key factor in optimizing joins is ...
Angela Maduko, Kemafor Anyanwu, Amit P. Sheth, Pau...
KDD
2003
ACM
145views Data Mining» more  KDD 2003»
14 years 8 months ago
Carpenter: finding closed patterns in long biological datasets
The growth of bioinformatics has resulted in datasets with new characteristics. These datasets typically contain a large number of columns and a small number of rows. For example,...
Feng Pan, Gao Cong, Anthony K. H. Tung, Jiong Yang...
ARC
2010
Springer
144views Hardware» more  ARC 2010»
14 years 2 months ago
QUAD - A Memory Access Pattern Analyser
In this paper, we present the Quantitative Usage Analysis of Data (QUAD) tool, a sophisticated memory access tracing tool that provides a comprehensive quantitative analysis of mem...
S. Arash Ostadzadeh, Roel Meeuws, Carlo Galuzzi, K...
IEEEARES
2007
IEEE
14 years 2 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
ICPR
2000
IEEE
13 years 11 months ago
Classification of Style-Constrained Pattern-Fields
In some classification tasks, all patterns in a field, such as digits in a ZIP-code image, originate from the same, but unknown, source (writer/print style). The class-conditional...
Prateek Sarkar, George Nagy