Sciweavers

1037 search results - page 190 / 208
» Architecture Knowledge Management: Challenges, Approaches, a...
Sort
View
75
Voted
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 1 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
CORR
2004
Springer
208views Education» more  CORR 2004»
14 years 9 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
HT
1993
ACM
15 years 1 months ago
Concurrency Control in Collaborative Hypertext Systems
Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
Uffe Kock Wiil, John J. Leggett
BMCBI
2010
153views more  BMCBI 2010»
14 years 9 months ago
MimoSA: a system for minimotif annotation
Background: Minimotifs are short peptide sequences within one protein, which are recognized by other proteins or molecules. While there are now several minimotif databases, they a...
Jay Vyas, Ronald J. Nowling, Thomas Meusburger, Da...
75
Voted
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 4 months ago
Simultaneous local and global state estimation for robotic navigation
— Recent applications of robotics often demand two types of spatial awareness: 1) A fine-grained description of the robot’s immediate surroundings for obstacle avoidance and p...
David C. Moore, Albert S. Huang, Matthew Walter, E...