Sciweavers

2663 search results - page 352 / 533
» How to Choose a Timing Model
Sort
View
ICDM
2007
IEEE
158views Data Mining» more  ICDM 2007»
15 years 9 months ago
On Appropriate Assumptions to Mine Data Streams: Analysis and Practice
Recent years have witnessed an increasing number of studies in stream mining, which aim at building an accurate model for continuously arriving data. Somehow most existing work ma...
Jing Gao, Wei Fan, Jiawei Han
107
Voted
AICCSA
2005
IEEE
104views Hardware» more  AICCSA 2005»
15 years 9 months ago
Multicast address management in the Internet: a study of the port blocking problem
A critical issue in multicast communication is how to identify multicast groups. In the Internet, multicast addresses and port numbers distinguish multicast groups from each other...
Emad Eldin Mohamed, Hussein M. Abdel-Wahab, I. Sal...
132
Voted
CEFP
2005
Springer
15 years 9 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
136
Voted
MSWIM
2003
ACM
15 years 8 months ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross
126
Voted
ECOOP
2000
Springer
15 years 7 months ago
Design Patterns Application in UML
The Unified Modeling Language (UML) currently proposes a mechanism to model recurrent design structures: the parameterized collaborations. The main goal of this mechanism is to mo...
Gerson Sunyé, Alain Le Guennec, Jean-Marc J...