Sciweavers

1097 search results - page 192 / 220
» Model Transformations in the Development of Data-Intensive W...
Sort
View
CBMS
2006
IEEE
14 years 2 months ago
Technology for Medical Education, Research, and Disease Screening by Exploitation of Biomarkers in a Large Collection of Uterine
The Communications Engineering Branch of the National Library of Medicine is collaborating with the National Cancer Institute (NCI) in developing applications for medical educatio...
L. Rodney Long, Sameer Antani, Jose Jeronimo, Mark...
CIKM
2008
Springer
13 years 9 months ago
Social tags: meaning and suggestions
This paper aims to quantify two common assumptions about social tagging: (1) that tags are “meaningful” and (2) that the tagging process is influenced by tag suggestions. For...
Fabian M. Suchanek, Milan Vojnovic, Dinan Gunaward...
SIGMOD
2005
ACM
135views Database» more  SIGMOD 2005»
14 years 8 months ago
Mining data streams: a review
The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
HIPC
2007
Springer
14 years 10 days ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
PLDI
2003
ACM
14 years 1 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam