Sciweavers

127 search results - page 25 / 26
» Identifying the missing tags in a large RFID system
Sort
View
ICSM
2005
IEEE
13 years 11 months ago
Design Pattern Mining Enhanced by Machine Learning
Design patterns present good solutions to frequently occurring problems in object-oriented software design. Thus their correct application in a system’s design may significantl...
Rudolf Ferenc, Árpád Beszédes...
INFOCOM
2009
IEEE
14 years 12 days ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
KBSE
2005
IEEE
13 years 11 months ago
Optimized run-time race detection and atomicity checking using partial discovered types
Concurrent programs are notorious for containing errors that are difficult to reproduce and diagnose. Two common kinds of concurrency errors are data races and atomicity violation...
Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott...
AI
2005
Springer
13 years 5 months ago
Unsupervised named-entity extraction from the Web: An experimental study
The KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an unsupervised, doma...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...
DAC
2010
ACM
13 years 9 months ago
Off-chip memory bandwidth minimization through cache partitioning for multi-core platforms
We present a methodology for off-chip memory bandwidth minimization through application-driven L2 cache partitioning in multicore systems. A major challenge with multi-core system...
Chenjie Yu, Peter Petrov