Sciweavers

599 search results - page 75 / 120
» Improving the Efficiency of XPath Execution on Relational Sy...
Sort
View
VLDB
1999
ACM
145views Database» more  VLDB 1999»
14 years 2 days ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
WCRE
2008
IEEE
14 years 2 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
WEBI
2007
Springer
14 years 1 months ago
OOPS: User Modeling Method for Task Oriented Mobile Internet Services
Growth in the mobile services industry has remarkably increased in the number of mobile services provided, and present methods of service provision have proven insufficient to gui...
Munehiko Sasajima, Yoshinobu Kitamura, Takefumi Na...
ECAI
2010
Springer
13 years 8 months ago
Mining Outliers with Adaptive Cutoff Update and Space Utilization (RACAS)
Recently the efficiency of an outlier detection algorithm ORCA was improved by RCS (Randomization with faster Cutoff update and Space utilization after pruning), which changes the ...
Chi-Cheong Szeto, Edward Hung
TON
2008
125views more  TON 2008»
13 years 7 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni