Sciweavers

8249 search results - page 1502 / 1650
» The DBO database system
Sort
View
KDD
2001
ACM
237views Data Mining» more  KDD 2001»
14 years 8 months ago
Exploiting Web Log Mining for Web Cache Enhancement
Abstract. Improving the performance of the Web is a crucial requirement, since its popularity resulted in a large increase in the user perceived latency. In this paper, we describe...
Alexandros Nanopoulos, Dimitrios Katsaros, Yannis ...
CHI
2008
ACM
14 years 8 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2006
ACM
14 years 8 months ago
Verbosity: a game for collecting common-sense facts
We address the problem of collecting a database of "common-sense facts" using a computer game. Informally, a common-sense fact is a true statement about the world that i...
Luis von Ahn, Mihir Kedia, Manuel Blum
HPCA
2005
IEEE
14 years 8 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICSE
2007
IEEE-ACM
14 years 8 months ago
Mining Software Engineering Data
Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's...
Tao Xie, Jian Pei, Ahmed E. Hassan
« Prev « First page 1502 / 1650 Last » Next »