Sciweavers

769 search results - page 80 / 154
» Identifying objects in legacy systems
Sort
View
ENTCS
2007
100views more  ENTCS 2007»
13 years 7 months ago
Type-Safe Code Transformations in Haskell
The use of typed intermediate languages can significantly increase the reliability of a compiler. By typechecking the code produced at each transformation stage, one can identify...
Louis-Julien Guillemette, Stefan Monnier
SIGOPS
2008
146views more  SIGOPS 2008»
13 years 7 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
IJCAI
1989
13 years 9 months ago
Comparing the Conceptual Systems of Experts
The knowledge to be acquired for the development of knowledge based systems is often distributed across a group of experts rather than available for elicitation from a single expe...
Brian R. Gaines, Mildred L. G. Shaw
IS
2002
13 years 7 months ago
Evaluation of concurrency control strategies for mixed soft real-time database systems
Previous research in real-time concurrency control mainly focuses on the schedulability guarantee of hard real-time transactions and the reducing of the miss rate of soft real-tim...
Kam-yiu Lam, Tei-Wei Kuo, Ben Kao, Tony S. H. Lee,...
CINQ
2004
Springer
225views Database» more  CINQ 2004»
14 years 1 months ago
A Data Mining Query Language for Knowledge Discovery in a Geographical Information System
Spatial data mining is a process used to discover interesting but not explicitly available, highly usable patterns embedded in both spatial and nonspatial data, which are possibly ...
Donato Malerba, Annalisa Appice, Michelangelo Ceci