Sciweavers

15781 search results - page 2976 / 3157
» Evaluating Information Extraction
Sort
View
141
Voted
DOLAP
2000
ACM
15 years 8 months ago
CUBIST: A New Algorithm For Improving the Performance of Ad-hoc OLAP Queries
Being able to efficiently answer arbitrary OLAP queries that aggregate along any combination of dimensions over numerical and categorical attributes has been a continued, major co...
Lixin Fu, Joachim Hammer
SIGUCCS
2000
ACM
15 years 8 months ago
The Master Internship Program at Wabash College
Wabash College has initiated an innovative strategy to solve technology staffing problems experienced by many small undergraduate liberal arts colleges. This strategy targets stud...
Guy Davis, John C. Hanes
153
Voted
CCS
1999
ACM
15 years 8 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
ISCA
1998
IEEE
151views Hardware» more  ISCA 1998»
15 years 8 months ago
Alternative Implementations of Two-Level Adaptive Branch Prediction
As the issue rate and depth of pipelining of high performance Superscalar processors increase, the importance of an excellent branch predictor becomes more vital to delivering the...
Tse-Yu Yeh, Yale N. Patt
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
15 years 8 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
« Prev « First page 2976 / 3157 Last » Next »