Sciweavers

153 search results - page 27 / 31
» Factors Affecting the Loyal Use of Knowledge Management Syst...
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 10 days ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ICEIS
2008
IEEE
14 years 2 months ago
Tool Support for the Integration of Light-Weight Ontologies
In many areas of computer science ontologies become more and more important. The use of ontologies for domain modeling often brings up the issue of ontology integration. The task o...
Thomas Heer, Daniel Retkowitz, Bodo Kraft
JODL
2000
123views more  JODL 2000»
13 years 8 months ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...
IEEEPACT
2005
IEEE
14 years 2 months ago
HUNTing the Overlap
Hiding communication latency is an important optimization for parallel programs. Programmers or compilers achieve this by using non-blocking communication primitives and overlappi...
Costin Iancu, Parry Husbands, Paul Hargrove