Sciweavers

11182 search results - page 2233 / 2237
» Shape Analysis of Sets
Sort
View
CIKM
2011
Springer
12 years 8 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
CONCUR
2011
Springer
12 years 8 months ago
Reasoning about Threads with Bounded Lock Chains
The problem of model checking threads interacting purely via the standard synchronization primitives is key for many concurrent program analyses, particularly dataflow analysis. U...
Vineet Kahlon
ECCE
2011
12 years 8 months ago
Design of a safe computer-supported cooperative environment in radiotherapy: exploratory identification of cooperation strategie
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
12 years 4 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
WSDM
2012
ACM
283views Data Mining» more  WSDM 2012»
12 years 4 months ago
The life and death of online groups: predicting group growth and longevity
We pose a fundamental question in understanding how to identify and design successful communities: What factors predict whether a community will grow and survive in the long term?...
Sanjay Ram Kairam, Dan J. Wang, Jure Leskovec
« Prev « First page 2233 / 2237 Last » Next »