Sciweavers

386 search results - page 41 / 78
» ideas 2000
Sort
View
USENIX
2008
13 years 10 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
SIGDOC
2000
ACM
14 years 1 days ago
Making complex document structures accessible through templates
We address two problems of technical authors in structured environments: (1) Structure definitions of the SGML school are limiting: they require one primary hierarchy and do not c...
Felix H. Gatzemeier, Oliver Meyer
ICDE
2000
IEEE
112views Database» more  ICDE 2000»
14 years 9 months ago
DEMON: Mining and Monitoring Evolving Data
Data mining algorithms have been the focus of much research recently. In practice, the input data to a data mining process resides in a large data warehouse whose data is kept up-...
Venkatesh Ganti, Johannes Gehrke, Raghu Ramakrishn...
ECTEL
2006
Springer
13 years 11 months ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
PRICAI
2000
Springer
13 years 11 months ago
Task Models, Intentions, and Agent Conversation Policies
It is possible to define conversation policies, such as communication or dialogue protocols, that are based strictly on what messages and, respectively, what performatives may foll...
Renee Elio, Afsaneh Haddadi, Ajit Singh