Sciweavers

1486 search results - page 213 / 298
» Algorithms for two-box covering
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
16 years 5 months ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 5 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
CHI
2002
ACM
16 years 5 months ago
Interactive querying of time series data
Title of Dissertation: INTERACTIVE GRAPHICAL QUERYING OF TIME SERIES AND LINEAR SEQUENCE DATA SETS Harry Hochheiser, Doctor of Philosophy, 2003 Dissertation directed by: Professor...
Harry Hochheiser
POPL
2003
ACM
16 years 5 months ago
Static prediction of heap space usage for first-order functional programs
We show how to efficiently obtain linear a priori bounds on the heap space consumption of first-order functional programs. The analysis takes space reuse by explicit deallocation ...
Martin Hofmann, Steffen Jost
VLDB
2001
ACM
104views Database» more  VLDB 2001»
16 years 5 months ago
Global transaction support for workflow management systems: from formal specification to practical implementation
In this paper, we present an approach to global transactionmanagementinworkflowenvironments.Thetransaction mechanism is based on the well-known notion of compensation, but extended...
Paul W. P. J. Grefen, Jochem Vonk, Peter M. G. Ape...