Sciweavers

11565 search results - page 2278 / 2313
» Computing Minimal Mappings
Sort
View
DMKD
1997
ACM
198views Data Mining» more  DMKD 1997»
14 years 4 days ago
Clustering Based On Association Rule Hypergraphs
Clustering in data mining is a discovery process that groups a set of data such that the intracluster similarity is maximized and the intercluster similarity is minimized. These d...
Eui-Hong Han, George Karypis, Vipin Kumar, Bamshad...
ISLPED
1997
ACM
108views Hardware» more  ISLPED 1997»
14 years 4 days ago
Techniques for low energy software
The energy consumption of a system depends upon the hardware and software component of a system. Since it is the software which drives the hardware in most systems, decisions take...
Huzefa Mehta, Robert Michael Owens, Mary Jane Irwi...
SIGCOMM
1997
ACM
14 years 3 days ago
Consistent Overhead Byte Stuffing
—Byte stuffing is a process that encodes a sequence of data bytes that may contain ‘illegal’ or ‘reserved’ values, using a potentially longer sequence that contains no oc...
Stuart Cheshire, Mary Baker
SIGMOD
1997
ACM
131views Database» more  SIGMOD 1997»
14 years 3 days ago
Maintenance of Data Cubes and Summary Tables in a Warehouse
Data warehouses contain large amounts of information, often collected from a variety of independent sources. Decision-support functions in a warehouse, such as on-line analytical ...
Inderpal Singh Mumick, Dallan Quass, Barinderpal S...
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
14 years 2 days ago
Optimization of critical paths in circuits with level-sensitive latches
A simple extension of the critical path method is presented which allows more accurate optimization of circuits with level-sensitive latches. The extended formulation provides a s...
Timothy M. Burks, Karem A. Sakallah
« Prev « First page 2278 / 2313 Last » Next »