Sciweavers

449 search results - page 74 / 90
» Intention-Disguised Algorithmic Trading
Sort
View
CHI
2011
ACM
13 years 5 days ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li
ICDE
1994
IEEE
87views Database» more  ICDE 1994»
14 years 22 days ago
Implementing Calendars and Temporal Rules in Next Generation Databases
In applications like nancial trading, scheduling, manufacturing and process control, time based predicates in queries and rules are very important. There is also a need to de ne ...
Rakesh Chandra, Arie Segev, Michael Stonebraker
MICRO
2000
IEEE
121views Hardware» more  MICRO 2000»
14 years 5 days ago
Memory hierarchy reconfiguration for energy and performance in general-purpose processor architectures
Conventional microarchitectures choose a single memory hierarchy design point targeted at the average application. In this paper, we propose a cache and TLB layout and design that...
Rajeev Balasubramonian, David H. Albonesi, Alper B...
DAWAK
2008
Springer
13 years 10 months ago
Efficient Approximate Mining of Frequent Patterns over Transactional Data Streams
Abstract. We investigate the problem of finding frequent patterns in a continuous stream of transactions. It is recognized that the approximate solutions are usually sufficient and...
Willie Ng, Manoranjan Dash