Sciweavers

431 search results - page 58 / 87
» The five orders of ignorance
Sort
View
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 3 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
CBMS
2009
IEEE
15 years 3 months ago
A medical image retrieval framework in correlation enhanced visual concept feature space
This paper presents a medical image retrieval framework that uses visual concepts in a feature space employing statistical models built using a probabilistic multi-class support v...
Md. Mahmudur Rahman, Sameer Antani, George R. Thom...
ADC
2008
Springer
143views Database» more  ADC 2008»
15 years 1 months ago
TRACK : A Novel XML Join Algorithm for Efficient Processing Twig Queries
In order to find all occurrences of a tree/twig pattern in an XML database, a number of holistic twig join algorithms have been proposed. However, most of these algorithms focus o...
Dongyang Li, Chunping Li
ESOP
2008
Springer
15 years 1 months ago
Regular Expression Subtyping for XML Query and Update Languages
Abstract. XML database query languages such as XQuery employ regular expression types with structural subtyping. Subtyping systems typically have two presentations, which should be...
James Cheney
AAAI
2010
15 years 1 months ago
Diversifying Query Suggestion Results
In order to improve the user search experience, Query Suggestion, a technique for generating alternative queries to Web users, has become an indispensable feature for commercial s...
Hao Ma, Michael R. Lyu, Irwin King