نتایج جستجو برای: access pattern

تعداد نتایج: 666151  

2017

The main objective of this project is to extend the state of the art in ontology engineering with advanced techniques for the definition, manipulation, maintenance and automatic extraction of ontology design patterns and ontology templates for the purpose of large scale ontology development. These techniques will play a key role in the creation of a ontologies in ongoing projects related to the...

Journal: :Inf. Sci. 2011
Francesca Arcelli Fontana Marco Zanoni

It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment of abstractions and views from a target system that should help the engineers to maintain, evolve and eventually re-engineer it. Two important tasks pursued by reverse engineering are design pattern detection and softw...

2015
David M. McKeown John F. Pane

Computer vision systems that attempt to extract cultural features from aerial imagery are often forced to interpret segmentations where the actual features are broken into numerous segments or fragments. For example, reads and road-like features are difficult to completely segment due to occlusions, poor contrast with their surroundings, and changes in surface material. Often the nature of the ...

2000
Guillaume Pierre Ihor Kuz Maarten van Steen

Caching and replication techniques can improve latency of the Web, while reducing network traffic and balancing load among servers. However, no single strategy is optimal for replicating all documents. Depending on its access pattern, each document should use the policy that suits it best. This paper presents an architecture for adaptive replicated documents. Each adaptive document monitors its...

Journal: :Studies in health technology and informatics 2004
Yoon-Ho Seol David R. Kaufman Eneida A. Mendonça James J. Cimino Stephen B. Johnson

Physicians' information needs routinely arise during their practice. Several studies have demonstrated that a useful way to understand the nature of the needs is to examine questions posed by physicians during the course of medical care. This paper presents an analysis of clinical questions collected when physicians were engaged in reviewing clinical cases. The main objective of the study was t...

2005
Nelly Delessy Eduardo B. Fernandez

Web services are becoming the way for enterprises to interoperate. Many security standards for them have been developed; one of these is XACML (eXtensible Access Control Markup Language). XACML has been defined by OASIS and it includes a policy, an access decision language, and a specialized web services policy language. We present here three architectural patterns for XACML. The XACML Authoriz...

2004
Long Wang Christoph Meinel

Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and c...

2012
Md.Azam Hosssain Md.Mamunur Rashid Byeong-Soo Jeong Ho-Jin Choi

Utility based web access pattern mining and knowledge discovery from database has become an interesting research domain in recent time. Traditional pattern mining algorithms deal with only binary occurrence of a web page and do not consider the weight or profit of the web page. Hence, utility-based web path traversal pattern mining technique has evolved and got much interest in recent time. How...

1997
Tara M. Madhyastha Daniel A. Reed

Input/output performance on current parallel le systems is sensitive to a good match of application access pattern to le system capabilities. Automatic input/output access classiication can determine application access patterns at execution time, guiding adaptive le system policies. In this paper we examine a new method for access pattern classiication that uses hidden Markov models, trained on...

Journal: :J. Database Manag. 2005
Zhen He Jérôme Darmont

This paper explores the effect that changing access patterns has on the performance of database management systems. Changes in access patterns play an important role in determining the efficiency of key performance optimization techniques, such as dynamic clustering, prefetching, and buffer replacement. However, all existing benchmarks or evaluation frameworks produce static access patterns in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید