Sciweavers

2932 search results - page 443 / 587
» Higher order mining
Sort
View
MICRO
2000
IEEE
95views Hardware» more  MICRO 2000»
14 years 2 months ago
Very low power pipelines using significance compression
Data, addresses, and instructions are compressed by maintaining only significant bytes with two or three extension bits appended to indicate the significant byte positions. This s...
Ramon Canal, Antonio González, James E. Smi...
PG
2000
IEEE
14 years 2 months ago
Progressive Geometry Compression for Meshes
A novel progressive geometry compression scheme is presented in the paper. In this scheme a mesh is represented as a base mesh followed by some groups of vertex split operations us...
Xinguo Liu, Hujun Bao, Qunsheng Peng, Pheng-Ann He...
RAID
2000
Springer
14 years 2 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
SRDS
1995
IEEE
14 years 2 months ago
Supporting Semantics-Based Transaction Processing in Mobile Database Applications
Advances in computer and telecommunication technologies have made mobile computing a reality. However, greater mobility implies a more tenuous network connection and a higher rate...
Gary D. Walborn, Panos K. Chrysanthis
VLDB
1995
ACM
73views Database» more  VLDB 1995»
14 years 2 months ago
Hot Block Clustering for Disk Arrays with Dynamic Striping
RAID5 disk arrays provide high performance and high reliability for reasonable cost. However RAID5 suffers a performance penalty during block updates. In order to overcome this pr...
Kazuhiko Mogi, Masaru Kitsuregawa