Sciweavers

4447 search results - page 848 / 890
» Service Interaction Patterns
Sort
View
112
Voted
SIGIR
2009
ACM
15 years 9 months ago
Dynamicity vs. effectiveness: studying online clustering for scatter/gather
We proposed and implemented a novel clustering algorithm called LAIR2, which has constant running time average for on-the-fly Scatter/Gather browsing [4]. Our experiments showed ...
Weimao Ke, Cassidy R. Sugimoto, Javed Mostafa
133
Voted
IEEEPACT
2008
IEEE
15 years 9 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
ICCV
2007
IEEE
15 years 8 months ago
Motion Analysis of Endovascular Stent-Grafts by MDL Based Registration
The endovascular repair of a traumatic rupture of the thoracic aorta - that would otherwise lead to the death of the patient - is performed by delivering a stent-graft into the ve...
Georg Langs, Nikos Paragios, Rene Donner, Pascal D...
118
Voted
ICDE
2007
IEEE
107views Database» more  ICDE 2007»
15 years 8 months ago
An Integrated Platform for Spatial Data Mining within a GIS Environment
The strength of GIS is in providing a rich data infrastructure for combining disparate data in meaningful ways by using a spatial arrangement (e.g., proximity). As a toolbox, a GI...
Annalisa Appice, Antonietta Lanza, Donato Malerba
137
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 8 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan