Sciweavers

5481 search results - page 991 / 1097
» Application Analysis for Parallel Processing
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Automated detection of api refactorings in libraries
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Kunal Taneja, Danny Dig, Tao Xie
SOCA
2007
IEEE
15 years 4 months ago
A Service-oriented Architecture for Business Intelligence
Business intelligence is a business management term used to describe applications and technologies which are used to gather, provide access to and analyze data and information abo...
Liya Wu, Gilad Barash, Claudio Bartolini
ACAL
2007
Springer
15 years 4 months ago
An Integrated QAP-Based Approach to Visualize Patterns of Gene Expression Similarity
Abstract. This paper illustrates how the Quadratic Assignment Problem (QAP) is used as a mathematical model that helps to produce a visualization of microarray data, based on the r...
Mario Inostroza-Ponta, Alexandre Mendes, Regina Be...
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 4 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
CEAS
2007
Springer
15 years 4 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury