Sciweavers

13004 search results - page 2600 / 2601
» Mining Software Data
Sort
View
CIKM
2011
Springer
12 years 5 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
ECCE
2011
12 years 5 months ago
Design of a safe computer-supported cooperative environment in radiotherapy: exploratory identification of cooperation strategie
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 1 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
ISCA
2012
IEEE
243views Hardware» more  ISCA 2012»
11 years 8 months ago
BlockChop: Dynamic squash elimination for hybrid processor architecture
Hybrid processors are HW/SW co-designed processors that leverage blocked-execution, the execution of regions of instructions as atomic blocks, to facilitate aggressive speculative...
Jason Mars, Naveen Kumar
TKDE
2012
208views Formal Methods» more  TKDE 2012»
11 years 8 months ago
A Knowledge-Driven Approach to Activity Recognition in Smart Homes
Abstract—This paper introduces a knowledge-driven approach to real-time, continuous activity recognition based on multisensor data streams in smart homes. The approach goes beyon...
Liming Chen, Chris D. Nugent, Hui Wang
« Prev « First page 2600 / 2601 Last » Next »