Today, when Java is entering the embedded market it needs performance
enhancements more than ever. Large-scale enterprise applications would also
benefit from better code optimization techniques. In this paper we present the
results of optimization with an optimizing framework we have developed. We
measure the impact of different optimizations on run times in different
execution environments and p... hiện toàn bộ
#Java #Optimizing compilers #Virtual machining #Containers #Large-scale systems #Packaging #Unified modeling language #Information analysis #Program processors #Virtual manufacturing
Proactive system monitoring is the search for potential problems in the
Information Systems (IS) before they occur. With reference to IS, monitoring is
always proactive. Watching for evidence of emerging or potential problems and
identifying their source (factor), checking available disk space, the health of
essential processes, probing systems to ensure that they are reachable, business
requireme... hiện toàn bộ
#Information systems #Condition monitoring #Computerized monitoring #Production #Protection #Network servers #Personnel #Joining processes #Probes #Web server
The aim of this paper is to present the methodology of Web farming and the
examples of its usage. Due to using numerous technologies relevant to Internet
(Web mining, data warehouse, CRM and many others) it offers a singularly strong
support for e-business systems. It enables efficient and methodical, as well a
systematic search in Internet resources for current and up-to-date information,
as well... hiện toàn bộ
Aside from the great progress in the field of human-computer interaction,
particularly in the last few years the need for the development of adaptive user
interfaces in several application areas has been recognized. Our research is
concentrated on intelligent tutoring systems, a generation of computerized
educational systems that attempt to mimic the capabilities of a human tutor. We
elaborate how... hiện toàn bộ
#User interfaces #Computer interfaces #Intelligent systems #Humans #Computer science education #Adaptive systems #Mathematics #Application software #Educational technology #Communication channels
This contribution sets out, with general observations on distance learning, and
with identifying the fundamental difference between learning at presence or from
a distance, which is essentially decoupling of teaching and learning in time and
speed. Then, experiences with developing and employing multimedia material in
distance teaching are presented, covering the phases of initial euphoria and
sub... hiện toàn bộ
This is the first report on a new approach to text compression. It consists of
representing the text file with compressed inverted file index in conjunction
with very compact lexicon, where lexicon includes every word in the text. The
index is compressed using standard index compression techniques, and lexicon is
compressed with original dictionary compression method that gives better
compression ... hiện toàn bộ
Two new approaches to Web log mining are presented. Novel advanced cleaning
improves Web log mining results. Improved filtering removes pages with no links
from other pages. In the data visualisation phase, technical representations of
Web pages are replaced by user attractive text interpretations. Experiments with
the real world problems showed that the proposed techniques significantly
increase ... hiện toàn bộ
#Cleaning #Data visualization #Data mining #Web mining #Web page design #Web server #Data analysis #Information systems #Mathematics #Filtering
In the paper an application for demonstration and analysis of data structures
and sorting algorithms is presented. Their operation can be animated and
demonstrated on asserted or generated input data, with different statistical
distributions. Analysis of the performance and of the complexity of various
algorithms can be calculated and/or measured.
What is important when choosing the multilevel security model? Is it merely the
way that model implements integrity rules (i.e. entity integrity property,
referential integrity property) or should the model's semantics of what user on
some specific level can see and/or believe be considered as well? In this paper,
the basic concepts of multilevel security (MLS) database models are described
and is... hiện toàn bộ
#Multilevel systems #Data security #Integrated circuit modeling #Relational databases #Marine vehicles #Data engineering #Access control #Bellows
A geometrical approach to validation of fuzzy temporal relations between fuzzy
time primitives, based on possibility and necessity measures is proposed in the
paper. Fuzzy temporal relations between fuzzy time points and a fuzzy time point
and fuzzy time interval are considered. The same approach can be used for
evaluation of relation between two fuzzy intervals. An example of validation
temporal ... hiện toàn bộ
#Humans #Fuzzy sets #Artificial intelligence #Fuzzy set theory #Fuzzy reasoning #Logic #Mathematics #Time measurement #Knowledge representation #Petri nets