Sciweavers

1963 search results - page 374 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
VIP
2001
13 years 10 months ago
Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study
Visualisation Systems are in general designed to maximise the cognitive ability of system users particularly when exposed to large sets of otherwise difficult to comprehend data, ...
Andrew Donohoo, Debbie Richards
WWW
2007
ACM
14 years 9 months ago
Supervised rank aggregation
This paper is concerned with rank aggregation, the task of combining the ranking results of individual rankers at meta-search. Previously, rank aggregation was performed mainly by...
Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhiming Ma, Han...
HPCA
2008
IEEE
14 years 9 months ago
Address-branch correlation: A novel locality for long-latency hard-to-predict branches
Hard-to-predict branches depending on longlatency cache-misses have been recognized as a major performance obstacle for modern microprocessors. With the widening speed gap between...
Hongliang Gao, Yi Ma, Martin Dimitrov, Huiyang Zho...
ISPASS
2006
IEEE
14 years 2 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...