Sciweavers

FOCS
2000
IEEE
14 years 4 months ago
Opportunistic Data Structures with Applications
There is an upsurging interest in designing succinct data structures for basic searching problems (see [23] and references therein). The motivation has to be found in the exponent...
Paolo Ferragina, Giovanni Manzini
DBTEL
2001
Springer
126views Database» more  DBTEL 2001»
14 years 4 months ago
Data Warehouse Population Platform
Abstract. The input data for a data warehouse, coming from operational systems, are not immediately ready for loading into data warehouse. Cleaning and integration could be necessa...
Jovanka Adzic, Valter Fiore, Stefano Spelta
ICCS
2003
Springer
14 years 5 months ago
Exploiting Stability to Reduce Time-Space Cost for Memory Tracing
Memory traces record the addresses touched by a program during its execution, enabling many useful investigations for understanding and predicting program performance. But complete...
Xiaofeng Gao, Allan Snavely
IBPRIA
2003
Springer
14 years 5 months ago
Supervised Locally Linear Embedding Algorithm for Pattern Recognition
The dimensionality of the input data often far exceeds their intrinsic dimensionality. As a result, it may be difficult to recognize multidimensional data, especially if the number...
Olga Kouropteva, Oleg Okun, Matti Pietikäinen
ICEIS
2003
IEEE
14 years 5 months ago
Incremental Horizontal Fragmentation of Database Class Objects
: Horizontal fragments of a class in an object-oriented database system contain subsets of the class extent or instance objects. These fragments are created with a set of system in...
Christie I. Ezeife, Pinakpani Dey
ICDE
2005
IEEE
110views Database» more  ICDE 2005»
14 years 6 months ago
Locality Aware Networked Join Evaluation
We pose the question: how do we efficiently evaluate a join operator, distributed over a heterogeneous network? Our objective here is to optimize the delay of output tuples. We di...
Yanif Ahmad, Ugur Çetintemel, John Jannotti...
EUROMICRO
2005
IEEE
14 years 6 months ago
Modelling of Input-Parameter Dependency for Performance Predictions of Component-Based Embedded Systems
The guaranty of meeting the timing constraints during the design phase of real-time component-based embedded software has not been realized. To satisfy real-time requirements, we ...
Egor Bondarev, Peter H. N. de With, Michel R. V. C...
CGO
2005
IEEE
14 years 6 months ago
Optimizing Sorting with Genetic Algorithms
The growing complexity of modern processors has made the generation of highly efficient code increasingly difficult. Manual code generation is very time consuming, but it is oft...
Xiaoming Li, María Jesús Garzar&aacu...
ADC
2006
Springer
169views Database» more  ADC 2006»
14 years 6 months ago
A further study in the data partitioning approach for frequent itemsets mining
Frequent itemsets mining is well explored for various data types, and its computational complexity is well understood. Based on our previous work by Nguyen and Orlowska (2005), th...
Son N. Nguyen, Maria E. Orlowska
PRDC
2006
IEEE
14 years 6 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...