Sciweavers

1129 search results - page 208 / 226
» Finding Similar Failures Using Callstack Similarity
Sort
View
WWW
2007
ACM
14 years 8 months ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 8 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...
KDD
2003
ACM
99views Data Mining» more  KDD 2003»
14 years 8 months ago
Fragments of order
High-dimensional collections of 0-1 data occur in many applications. The attributes in such data sets are typically considered to be unordered. However, in many cases there is a n...
Aristides Gionis, Teija Kujala, Heikki Mannila
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 8 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams