Sciweavers

1045 search results - page 136 / 209
» The Use of Exceptions
Sort
View
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
14 years 1 months ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster
IMC
2003
ACM
14 years 1 months ago
An analysis of Internet chat systems
In our quest to better understand network traffic dynamics, we examine Internet chat systems. Although chat as an application does not contribute huge amounts of traffic, chat sys...
Christian Dewes, Arne Wichmann, Anja Feldmann
SAC
2003
ACM
14 years 1 months ago
Validation of Code-Improving Transformations for Embedded Systems
Programmers of embedded systems often develop software in assembly code due to inadequate support from compilers and the need to meet critical speed and/or space constraints. Many...
Robert van Engelen, David B. Whalley, Xin Yuan
DEXA
2003
Springer
222views Database» more  DEXA 2003»
14 years 1 months ago
Process Data Store: A Real-Time Data Store for Monitoring Business Processes
With access to real-time information on critical performance indicators of business processes, managers and staff members can play a crucial role in improving the speed and effecti...
Josef Schiefer, Beate List, Robert M. Bruckner
ICCS
2003
Springer
14 years 1 months ago
Exploiting Stability to Reduce Time-Space Cost for Memory Tracing
Memory traces record the addresses touched by a program during its execution, enabling many useful investigations for understanding and predicting program performance. But complete...
Xiaofeng Gao, Allan Snavely