Sciweavers

322 search results - page 52 / 65
» Recovering execution data from incomplete observations
Sort
View
PODS
2009
ACM
100views Database» more  PODS 2009»
14 years 10 months ago
Space-optimal heavy hitters with strong error bounds
The problem of finding heavy hitters and approximating the frequencies of items is at the heart of many problems in data stream analysis. It has been observed that several propose...
Radu Berinde, Graham Cormode, Piotr Indyk, Martin ...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 10 months ago
Modeling relationships at multiple scales to improve accuracy of large recommender systems
The collaborative filtering approach to recommender systems predicts user preferences for products or services by learning past useritem relationships. In this work, we propose no...
Robert M. Bell, Yehuda Koren, Chris Volinsky
ICSE
2009
IEEE-ACM
14 years 10 months ago
A toolset for automated failure analysis
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Fabrizio Pastore, Leonardo Mariani, Mauro Pezz&egr...
IS
2011
13 years 1 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
CC
2006
Springer
125views System Software» more  CC 2006»
14 years 1 months ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...