Sciweavers

1826 search results - page 170 / 366
» Controlling data movement in global computing applications
Sort
View
KDD
1994
ACM
117views Data Mining» more  KDD 1994»
15 years 8 months ago
Application of the TETRAD II Program to the Study of Student Retention in U.S. Colleges
We applied TETRAD II, a causal discovery program developed in Carnegie Mellon University's Department of Philosophy, to a database containing information on 204 U.S. colleges...
Marek J. Druzdze, Clark Glymour
ASM
2000
ASM
15 years 9 months ago
Report on a Practical Application of ASMs in Software Design
ASMs have been used at Siemens Corporate Technology to design a component in a software package called FALKO. Main purpose of FALKO is the construction and validation of timetables...
Egon Börger, Peter Päppinghaus, Joachim ...
134
Voted
SAC
2006
ACM
15 years 10 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
SLIP
2000
ACM
15 years 9 months ago
Prediction of interconnect fan-out distribution using Rent's rule
Based on Rent’s rule, a well-established empirical relationship, a rigorous derivation of the interconnect fan-out distribution for random logic networks is performed. Through c...
Payman Zarkesh-Ha, Jeffrey A. Davis, William Loh, ...
155
Voted
ICDCS
2008
IEEE
15 years 11 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...