Sciweavers

134 search results - page 13 / 27
» Detecting Clones in Business Applications
Sort
View
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 10 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
ICDIM
2008
IEEE
14 years 4 months ago
Dynamic detection and administration of materialized views based on the Query Graph Model
Database Management Systems (DBMS) are complex software systems which are used in an increasing number of applications. To obtain the best performance for business relevant applic...
Andreas Lübcke, Ingolf Geist, Ronny Bubke
JDI
2006
45views more  JDI 2006»
13 years 9 months ago
The Next Killer Ap
: The next `killer ap' is a term the software development community uses to describe its great quest for advancing technology by defining and meeting users' needs and wan...
BPM
2008
Springer
122views Business» more  BPM 2008»
13 years 12 months ago
Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance
Abstract. Many work has been conducted to analyze service choreographies to assert manyfold correctness criteria. While errors can be detected automatically, the correction of defe...
Niels Lohmann
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
14 years 11 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...