Sciweavers

1777 search results - page 271 / 356
» Surveillance Event Detection
Sort
View
ASPLOS
2010
ACM
15 years 6 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
132
Voted
ICDE
2010
IEEE
206views Database» more  ICDE 2010»
15 years 5 months ago
HECATAEUS: Regulating Schema Evolution
HECATAEUS is an open-source software tool for enabling impact prediction, what-if analysis, and regulation of relational database schema evolution. We follow a graph theoretic appr...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
150
Voted
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 4 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
137
Voted
IPPS
2006
IEEE
15 years 9 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
135
Voted
ACL
2012
13 years 6 months ago
Finding Bursty Topics from Microblogs
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Al...
Qiming Diao, Jing Jiang, Feida Zhu, Ee-Peng Lim