Sciweavers

5583 search results - page 1005 / 1117
» Application of Micro-Genetic Algorithm for Task Based Comput...
Sort
View
SIGSOFT
2007
ACM
16 years 1 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
110
Voted
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
16 years 1 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
121
Voted
KDD
2005
ACM
182views Data Mining» more  KDD 2005»
16 years 1 months ago
Making holistic schema matching robust: an ensemble approach
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. As an essential task toward integrating these m...
Bin He, Kevin Chen-Chuan Chang
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
16 years 1 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
86
Voted
CIKM
2009
Springer
15 years 7 months ago
Vetting the links of the web
Many web links mislead human surfers and automated crawlers because they point to changed content, out-of-date information, or invalid URLs. It is a particular problem for large, ...
Na Dai, Brian D. Davison
« Prev « First page 1005 / 1117 Last » Next »