Sciweavers

2348 search results - page 127 / 470
» Evaluation Patterns of Tele-Haptics
Sort
View
EDBT
2008
ACM
150views Database» more  EDBT 2008»
14 years 9 months ago
Cost-based query optimization for complex pattern mining on multiple databases
For complex data mining queries, query optimization issues arise, similar to those for the traditional database queries. However, few works have applied the cost-based query optim...
Ruoming Jin, David Fuhry, Abdulkareem Alali
ADBIS
2009
Springer
127views Database» more  ADBIS 2009»
14 years 3 months ago
Window Update Patterns in Stream Operators
Continuous queries applied over nonterminating data streams usually specify windows in order to obtain an evolving –yet restricted– set of tuples and thus provide timely result...
Kostas Patroumpas, Timos K. Sellis
BPM
2009
Springer
161views Business» more  BPM 2009»
14 years 3 months ago
Trace Clustering Based on Conserved Patterns: Towards Achieving Better Process Models
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
FGIT
2009
Springer
14 years 3 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
HPCA
2008
IEEE
14 years 3 months ago
Prediction of CPU idle-busy activity pattern
Real-world workloads rarely saturate multi-core processor. CPU C-states can be used to reduce power consumption during processor idle time. The key unsolved problem is: when and h...
Qian Diao, Justin J. Song