Sciweavers

3995 search results - page 762 / 799
» Linearization of hybrid processes
Sort
View
134
Voted
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 3 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
120
Voted
CHI
2005
ACM
16 years 3 months ago
Evaluating navigational surrogate formats with divergent browsing tasks
Navigational surrogates are representations that stand for information resources within search engine result sets, e-commerce sites, and digital libraries. They also form the basi...
Andruid Kerne, Steven M. Smith, Hyun Choi, Ross Gr...
140
Voted
VLSID
2001
IEEE
164views VLSI» more  VLSID 2001»
16 years 3 months ago
An Efficient Parallel Transparent Bist Method For Multiple Embedded Memory Buffers
In this paper, we propose a new transparent built-in self-test ( TBIST ) method to test multiple embedded memory arrays with various sizes in parallel. First, a new transparent tes...
Der-Cheng Huang, Wen-Ben Jone, Sunil R. Das
HPCA
2003
IEEE
16 years 3 months ago
Memory System Behavior of Java-Based Middleware
Java-based middleware, and application servers in particular, are rapidly gaining importance as a new class of workload for commercial multiprocessor servers. SPEC has recognized ...
Martin Karlsson, Kevin E. Moore, Erik Hagersten, D...
POPL
2008
ACM
16 years 3 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...