Sciweavers

1056 search results - page 177 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
255
Voted
POPL
2007
ACM
16 years 4 months ago
Dynamic heap type inference for program understanding and debugging
C programs can be difficult to debug due to lax type enforcement and low-level access to memory. We present a dynamic analysis for C that checks heap snapshots for consistency wit...
Ben Liblit, Chloë W. Schulze, Marina Polishch...
257
Voted
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 3 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
204
Voted
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 3 months ago
Entity resolution with iterative blocking
Entity Resolution (ER) is the problem of identifying which records in a database refer to the same real-world entity. An exhaustive ER process involves computing the similarities b...
Steven Euijong Whang, David Menestrina, Georgia Ko...
218
Voted
SIGMOD
2008
ACM
190views Database» more  SIGMOD 2008»
16 years 3 months ago
OLTP through the looking glass, and what we found there
Online Transaction Processing (OLTP) databases include a suite of features -- disk-resident B-trees and heap files, locking-based concurrency control, support for multi-threading ...
Stavros Harizopoulos, Daniel J. Abadi, Samuel Madd...
234
Voted
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
16 years 3 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...