Sciweavers

AICCSA
2008
IEEE
842views Hardware» more  AICCSA 2008»
14 years 1 months ago
Intelligent heart disease prediction system using data mining techniques
The healthcare industry collects huge amounts of healthcare data which, unfortunately, are not "mined" to discover hidden information for effective decision making. Disc...
Sellappan Palaniappan, Rafiah Awang
AICCSA
2008
IEEE
227views Hardware» more  AICCSA 2008»
14 years 1 months ago
Preventing admission failures of bandwidth reservation in wireless mesh networks
Quality of Service for wireless mesh networks is an often requested feature for various kinds of applications. A common approach is the hop-by-hop reservation of bandwidth for ind...
André Herms, Georg Lukas
AICCSA
2008
IEEE
232views Hardware» more  AICCSA 2008»
14 years 1 months ago
A multipattern matching algorithm using sampling and bit index
Jinhui Chen, Zhongfu Ye, Min Tang
AICCSA
2008
IEEE
276views Hardware» more  AICCSA 2008»
14 years 1 months ago
Effects of dimensionality reduction techniques on time series similarity measurements
Time Series are ubiquitous, hence, similarity search is one of the biggest challenges in the area of mining time series data. This is due to the vast data size, number of sequence...
Ghazi Al-Naymat, Javid Taheri
AICCSA
2008
IEEE
292views Hardware» more  AICCSA 2008»
14 years 6 months ago
Enumeration of maximal clique for mining spatial co-location patterns
This paper presents a systematic approach to mine colocation patterns in Sloan Digital Sky Survey (SDSS) data. SDSS Data Release 5 (DR5) contains 3.6 TB of data. Availability of s...
Ghazi Al-Naymat
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
14 years 6 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 6 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
AICCSA
2008
IEEE
290views Hardware» more  AICCSA 2008»
14 years 6 months ago
Test of preemptive real-time systems
Time Petri nets with stopwatches not only model system/environment interactions and time constraints. They further enable modeling of suspend/resume operations in real-time system...
Noureddine Adjir, Pierre de Saqui-Sannes, Kamel Mu...
AICCSA
2008
IEEE
267views Hardware» more  AICCSA 2008»
14 years 6 months ago
Comprehensive support for management of enterprise applications
During the last decades, performance of available hardware resources constantly increased [15], which enabled the assignment of more and more complex tasks to software systems. As...
Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido...
AICCSA
2008
IEEE
245views Hardware» more  AICCSA 2008»
14 years 6 months ago
Rapid and robust ranking of text documents in a dynamically changing corpus
Ranking documents in a selected corpus plays an important role in information retrieval systems. Despite notable advances in this direction, with continuously accumulating text do...
Byung-Hoon Park, Nagiza F. Samatova, Rajesh Munava...