Sciweavers

1272 search results - page 169 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
16 years 4 months ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
ICIAP
2005
ACM
16 years 4 months ago
A Neural Adaptive Algorithm for Feature Selection and Classification of High Dimensionality Data
In this paper, we propose a novel method which involves neural adaptive techniques for identifying salient features and for classifying high dimensionality data. In particular a ne...
Elisabetta Binaghi, Ignazio Gallo, Mirco Boschetti...
BPM
2009
Springer
116views Business» more  BPM 2009»
15 years 10 months ago
Discovering Reference Models by Mining Process Variants Using a Heuristic Approach
Abstract. Recently, a new generation of adaptive Process-Aware Information Systems (PAISs) has emerged, which enables structural process changes during runtime. Such flexibility, ...
Chen Li, Manfred Reichert, Andreas Wombacher
CODES
2008
IEEE
15 years 10 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
ICSM
2008
IEEE
15 years 10 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao