Sciweavers

469 search results - page 55 / 94
» Survey of graph database models
Sort
View
ISSTA
2009
ACM
15 years 6 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 7 days ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
SC
2009
ACM
15 years 6 months ago
Evaluating use of data flow systems for large graph analysis
Large graph analysis has become increasingly important and is widely used in many applications such as web mining, social network analysis, biology, and information retrieval. The...
Andy Yoo, Ian Kaplan
SIGMOD
2003
ACM
112views Database» more  SIGMOD 2003»
15 years 12 months ago
A Theory of Redo Recovery
Our goal is to understand redo recovery. We define an installation graph of operations in an execution, an ordering significantly weaker than conflict ordering from concurrency co...
David B. Lomet, Mark R. Tuttle
BTW
2007
Springer
123views Database» more  BTW 2007»
15 years 6 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich