Sciweavers

14306 search results - page 2655 / 2862
» Database System Concepts
Sort
View
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 4 months ago
Data Mining for Typhoon Image Collection
This paper introduces the application of data mining methods to the analysis and prediction of the typhoon. The testbed for this research is the typhoon image collection that we e...
Asanobu Kitamoto
KDD
2001
ACM
237views Data Mining» more  KDD 2001»
16 years 4 months ago
Exploiting Web Log Mining for Web Cache Enhancement
Abstract. Improving the performance of the Web is a crucial requirement, since its popularity resulted in a large increase in the user perceived latency. In this paper, we describe...
Alexandros Nanopoulos, Dimitrios Katsaros, Yannis ...
CHI
2008
ACM
16 years 4 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2006
ACM
16 years 4 months ago
Verbosity: a game for collecting common-sense facts
We address the problem of collecting a database of "common-sense facts" using a computer game. Informally, a common-sense fact is a true statement about the world that i...
Luis von Ahn, Mihir Kedia, Manuel Blum
HPCA
2005
IEEE
16 years 4 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
« Prev « First page 2655 / 2862 Last » Next »