Sciweavers

482 search results - page 70 / 97
» Proposal for compilation techniques of monitoring tasks to i...
Sort
View
KDD
2003
ACM
214views Data Mining» more  KDD 2003»
14 years 9 months ago
Adaptive duplicate detection using learnable string similarity measures
The problem of identifying approximately duplicate records in databases is an essential step for data cleaning and data integration processes. Most existing approaches have relied...
Mikhail Bilenko, Raymond J. Mooney
ECOOPW
1998
Springer
14 years 16 days ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
SIGCOMM
2003
ACM
14 years 1 months ago
A knowledge plane for the internet
We propose a new objective for network research: to build a fundamentally different sort of network that can assemble itself given high level instructions, reassemble itself as re...
David D. Clark, Craig Partridge, J. Christopher Ra...
SIGPLAN
2002
13 years 8 months ago
Write barrier removal by static analysis
We present a new analysis for removing unnecessary write barriers in programs that use generational garbage collection. To our knowledge, this is the first static program analysis...
Karen Zee, Martin C. Rinard
MINENET
2005
ACM
14 years 2 months ago
Topographical proximity for mining network alarm data
Increasingly powerful fault management systems are required to ensure robustness and quality of service in today’s networks. In this context, event correlation is of prime impor...
Ann Devitt, Joseph Duffin, Robert Moloney