Sciweavers

4081 search results - page 690 / 817
» Metaprogramming for Relational Databases
Sort
View
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
15 years 5 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
101
Voted
ICDM
2002
IEEE
108views Data Mining» more  ICDM 2002»
15 years 5 months ago
Mining Association Rules from Stars
Association rule mining is an important data mining problem. It is found to be useful for conventional relational data. However, previous work has mostly targeted on mining a sing...
Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang
95
Voted
ICSM
2002
IEEE
15 years 5 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
ISCA
2002
IEEE
127views Hardware» more  ISCA 2002»
15 years 5 months ago
The Optimum Pipeline Depth for a Microprocessor
The impact of pipeline length on the performance of a microprocessor is explored both theoretically and by simulation. An analytical theory is presented that shows two opposing ar...
Allan Hartstein, Thomas R. Puzak
BTW
2009
Springer
118views Database» more  BTW 2009»
15 years 5 months ago
Easy Tasks Dominate Information Retrieval Evaluation Results
: The evaluation of information retrieval systems involves the creation of potential user needs for which systems try to find relevant documents. The difficulty of these topics dif...
Thomas Mandl