Sciweavers

20807 search results - page 3979 / 4162
» How to read a paper
Sort
View
ASPLOS
2010
ACM
14 years 1 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
DCC
2010
IEEE
14 years 1 months ago
A Fast Compact Prefix Encoding for Pattern Matching in Limited Resources Devices
This paper improves the Tagged Suboptimal Codes (TSC) compression scheme in several ways. We show how to process the TSC as a universal code. We introduce the TSCk as a family of ...
S. Harrusi, Amir Averbuch, N. Rabin
EDBT
2010
ACM
152views Database» more  EDBT 2010»
14 years 1 months ago
Feedback-based annotation, selection and refinement of schema mappings for dataspaces
The specification of schema mappings has proved to be time and resource consuming, and has been recognized as a critical bottleneck to the large scale deployment of data integrati...
Khalid Belhajjame, Norman W. Paton, Suzanne M. Emb...
CEC
2009
IEEE
14 years 1 months ago
Using genetic programming to obtain implicit diversity
—When performing predictive data mining, the use of ensembles is known to increase prediction accuracy, compared to single models. To obtain this higher accuracy, ensembles shoul...
Ulf Johansson, Cecilia Sönströd, Tuve L&...
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
14 years 1 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
« Prev « First page 3979 / 4162 Last » Next »