Sciweavers

2006 search results - page 326 / 402
» Heuristic Security-Testing Methods
Sort
View
ER
2001
Springer
130views Database» more  ER 2001»
14 years 1 months ago
NF-SS: A Normal Form for Semistructured Schema
Semistructured data is becoming increasingly important for web applications with the development of XML and related technologies. Designing a “good” semistructured database is ...
Xiaoying Wu, Tok Wang Ling, Sin Yeung Lee, Mong-Li...
ICCS
2001
Springer
14 years 1 months ago
Statistical Models for Automatic Performance Tuning
Achieving peak performance from library subroutines usually requires extensive, machine-dependent tuning by hand. Automatic tuning systems have emerged in response, and they typic...
Rich Vuduc, James Demmel, Jeff Bilmes
ACMSE
2000
ACM
14 years 1 months ago
Exploring an information-based approach to computation and computational complexity
We present the background and justi cation for a new approachto studying computation and computational complexity. We focus on categories of problems and categories of solutions w...
D. E. Stevenson
CIKM
2000
Springer
14 years 1 months ago
Boosting for Document Routing
RankBoost is a recently proposed algorithm for learning ranking functions. It is simple to implement and has strong justifications from computational learning theory. We describe...
Raj D. Iyer, David D. Lewis, Robert E. Schapire, Y...
ASPDAC
1999
ACM
93views Hardware» more  ASPDAC 1999»
14 years 1 months ago
Optimization of Linear Placements for Wirelength Minimization with Free Sites
We study a type of linear placement problem arising in detailed placement optimization of a given cell row in the presence of white-space (extra sites). In this single-row placeme...
Andrew B. Kahng, Paul Tucker, Alexander Zelikovsky