Sciweavers

1687 search results - page 59 / 338
» Which pointer analysis should I use
Sort
View
112
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
XChange: coupling parallel applications in a dynamic environment
Modern computational science applications are becoming increasingly multi-disciplinaty involving widely distributed research teams and their underlying computational platforms. A ...
Hasan Abbasi, Matthew Wolf, Karsten Schwan, Greg E...
126
Voted
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 9 months ago
Maintaining Continuous Dependability in Sensor-Based Context-Aware Pervasive Computing Systems
Sensors are often indicative of events of interest, or events which a system should be aware of and should react to. In particular, such indications may reflect unsteadiness or in...
Amir Padovitz, Arkady B. Zaslavsky, Seng Wai Loke,...
129
Voted
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 9 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
131
Voted
DAS
2010
Springer
15 years 7 months ago
Text extraction from graphical document images using sparse representation
A novel text extraction method from graphical document images is presented in this paper. Graphical document images containing text and graphics components are considered as two-d...
Thai V. Hoang, Salvatore Tabbone
127
Voted
HICSS
2000
IEEE
125views Biometrics» more  HICSS 2000»
15 years 8 months ago
Beyond Bounded Activity Systems: Heterogeneous Cultures in Instructional Uses of Persistent Conversation
This paper proposes a two-level theoretical framework for the study of CMC illustrating the principles of mediation and contextual analysis. Based on log files and interviews from...
Steven L. Thorne