Sciweavers

2372 search results - page 360 / 475
» Probabilistic calling context
Sort
View
89
Voted
EUROPAR
2001
Springer
15 years 5 months ago
Load Redundancy Elimination on Executable Code
Optimizations performed at link time or directly applied to nal program executables have received increased attention in recent years. This paper discuss the discovery and elimina...
Manel Fernández, Roger Espasa, Saumya K. De...
98
Voted
ISMIR
2001
Springer
108views Music» more  ISMIR 2001»
15 years 5 months ago
Towards a Cognitive Model of Melodic Similarity
In recent years the interest in melodic similarity has mushroomed mainly due to the increased importance of music information retrieval (MIR). A great number of similarity models ...
Ludger Hofmann-Engl
134
Voted
ACSAC
2000
IEEE
15 years 5 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
99
Voted
IPPS
2000
IEEE
15 years 5 months ago
Deterministic Replay of Distributed Java Applications
Execution behavior of a Java application can be nondeterministic due to concurrent threads of execution, thread scheduling, and variable network delays. This nondeterminism in Jav...
Ravi B. Konuru, Harini Srinivasan, Jong-Deok Choi
119
Voted
ITCC
2000
IEEE
15 years 5 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh