Sciweavers

478 search results - page 63 / 96
» Working Effectively with Legacy Code
Sort
View
SCAM
2008
IEEE
15 years 4 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
JMLR
2006
105views more  JMLR 2006»
14 years 10 months ago
Parallel Software for Training Large Scale Support Vector Machines on Multiprocessor Systems
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Luca Zanni, Thomas Serafini, Gaetano Zanghirati
WKDD
2010
CPS
238views Data Mining» more  WKDD 2010»
14 years 7 months ago
3D Scientific Data Mining in Ion Trajectories
In physics, structure of glass and ion trajectories are essentially based on statistical analysis of data acquired through experimental measurement and computer simulation [1, 2]. ...
J. M. Sharif, M. Mahadi Abdul Jamil, Md. Asri Ngad...
ICDE
2009
IEEE
114views Database» more  ICDE 2009»
15 years 11 months ago
XOntoRank: Ontology-Aware Search of Electronic Medical Records
As the use of Electronic Medical Records (EMRs) becomes more widespread, so does the need for effective information discovery within them. Recently proposed EMR standards are XML-b...
Fernando Farfán, Vagelis Hristidis, Anand R...
AINA
2009
IEEE
15 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee