Sciweavers

4135 search results - page 802 / 827
» Application Modeling for the Semantic Web
Sort
View
TR
2010
159views Hardware» more  TR 2010»
14 years 6 months ago
Accelerated Degradation Tests Applied to Software Aging Experiments
Abstract--In the past ten years, the software aging phenomenon has been systematically researched, and recognized by both academic, and industry communities as an important obstacl...
Rivalino Matias, Pedro Alberto Barbetta, Kishor S....
120
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 2 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
16 years 9 days ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
ICIAP
2007
ACM
15 years 12 months ago
Window Detection in Facades
This work is about a novel methodology for window detection in urban environments and its multiple use in vision system applications. The presented method for window detection inc...
Haider Ali, Christin Seifert, Nitin Jindal, Lucas ...
98
Voted
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 6 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...