Sciweavers

4166 search results - page 791 / 834
» Automating the constraining process
Sort
View
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
15 years 10 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
SIGMOD
2002
ACM
246views Database» more  SIGMOD 2002»
15 years 10 months ago
Hierarchical subspace sampling: a unified framework for high dimensional data reduction, selectivity estimation and nearest neig
With the increased abilities for automated data collection made possible by modern technology, the typical sizes of data collections have continued to grow in recent years. In suc...
Charu C. Aggarwal
ICSE
2005
IEEE-ACM
15 years 10 months ago
Predictors of customer perceived software quality
Predicting software quality as perceived by a customer may allow an organization to adjust deployment to meet the quality expectations of its customers, to allocate the appropriat...
Audris Mockus, Ping Zhang, Paul Luo Li
ICFP
2004
ACM
15 years 9 months ago
Slideshow: functional presentations
Among slide-presentation systems, the dominant application offers lly no abstraction capability. Slideshow, an extension of PLT Scheme, represents our effort over the last several...
Robert Bruce Findler, Matthew Flatt
MOBISYS
2006
ACM
15 years 9 months ago
WiFiProfiler: cooperative diagnosis in wireless LANs
While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manual...
Ranveer Chandra, Venkata N. Padmanabhan, Ming Zhan...