Sciweavers

205 search results - page 15 / 41
» Pattern regularity as a visual key
Sort
View
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
14 years 1 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
ICSE
1999
IEEE-ACM
14 years 4 days ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...
ISCI
2011
13 years 2 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
DATESO
2009
146views Database» more  DATESO 2009»
13 years 5 months ago
Compression of the Stream Array Data Structure
In recent years, many approaches to XML twig pattern query (TPQ) processing have been developed. Some algorithms are supported by a stream abstract data type. s an abstract data ty...
Radim Baca, Martin Pawlas
IJMMS
2007
166views more  IJMMS 2007»
13 years 7 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...