Sciweavers

4126 search results - page 622 / 826
» Set based logic programming
Sort
View
ASPLOS
2000
ACM
15 years 7 months ago
Software Profiling for Hot Path Prediction: Less is More
Recently, there has been a growing interest in exploiting profile information in adaptive systems such as just-in-time compilers, dynamic optimizers and, binary translators. In th...
Evelyn Duesterwald, Vasanth Bala
ICDE
2004
IEEE
105views Database» more  ICDE 2004»
16 years 4 months ago
SPINE: Putting Backbone into String Indexing
The indexing technique commonly used for long strings, such as genomes, is the suffix tree, which is based on a vertical (intra-path) compaction of the underlying trie structure. ...
Naresh Neelapala, Romil Mittal, Jayant R. Haritsa
ICCS
2009
Springer
15 years 9 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
WCRE
2008
IEEE
15 years 9 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
FUZZIEEE
2007
IEEE
15 years 9 months ago
Genetic Learning of Membership Functions for Mining Fuzzy Association Rules
— Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction da...
Rafael Alcalá, Jesús Alcalá-F...