Sciweavers

315 search results - page 31 / 63
» Claims Analysis
Sort
View
130
Voted
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 9 months ago
Performance modeling of resonant tunneling based RAMs
Tunneling based random-access memories (TRAM’s) have recently garnered a great amount of interests among the memory designers due to their intrinsic merits such as reduced power...
Hui Zhang, Pinaki Mazumder, Li Ding 0002, Kyoungho...
HICSS
2000
IEEE
106views Biometrics» more  HICSS 2000»
15 years 8 months ago
Two Corpuses of Spreadsheet Errors
The widespread presence of errors in spreadsheets is now well-established. Quite a few methodological and software approaches have been suggested as ways to reduce spreadsheet err...
Raymond R. Panko
INFOCOM
2000
IEEE
15 years 8 months ago
On the Aggregatability of Multicast Forwarding State
Abstract— It has been claimed that multicast state cannot be aggregated. In this paper, we will debunk this myth and present a simple technique that can be used to aggregate mult...
David Thaler, Mark Handley
HICSS
1999
IEEE
82views Biometrics» more  HICSS 1999»
15 years 8 months ago
On the Spanning Hypothesis for EDI Semantics
What EDI needs is a good semantics, that is, a workable formal theory of what EDI messages mean. As is widely recognized, the point applies to electronic commerce and to communica...
Steven O. Kimbrough, Scott A. Moore
KDD
1999
ACM
147views Data Mining» more  KDD 1999»
15 years 8 months ago
Text Mining: Finding Nuggets in Mountains of Textual Data
Text mining appliesthe sameanalytical functions of datamining to the domainof textual information, relying on sophisticatedtext analysis techniques that distill information from f...
Jochen Dörre, Peter Gerstl, Roland Seiffert