Sciweavers

1045 search results - page 168 / 209
» The Use of Exceptions
Sort
View
TSC
2008
112views more  TSC 2008»
13 years 8 months ago
A Privacy Preserving Repository for Data Integration across Data Sharing Services
Current data sharing and integration among various organizations require a central and trusted authority to collect data from all data sources and then integrate the collected data...
Stephen S. Yau, Yin Yin
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
13 years 6 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
LCPC
2001
Springer
14 years 14 days ago
A Comparative Evaluation of Parallel Garbage Collector Implementations
While uniprocessor garbage collection is relatively well understood, experience with collectors for large multiprocessor servers is limited and it is unknown which techniques best ...
C. Richard Attanasio, David F. Bacon, Anthony Cocc...
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 2 months ago
HSDPA Performance in Live Networks
—The first HSDPA (High-Speed Downlink Packet Access) networks have been recently deployed for operational use. We evaluate and compare live HSDPA operational network performance ...
Marko Jurvansuu, Jarmo Prokkola, Mikko Hanski, Pek...
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
14 years 9 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga