Sciweavers

832 search results - page 115 / 167
» Spatial Data Mining Implementation: Alternatives and Perform...
Sort
View
ICS
2010
Tsinghua U.
15 years 6 months ago
Speeding up Nek5000 with autotuning and specialization
Autotuning technology has emerged recently as a systematic process for evaluating alternative implementations of a computation, in order to select the best-performing solution for...
Jaewook Shin, Mary W. Hall, Jacqueline Chame, Chun...
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
CCR
1998
90views more  CCR 1998»
15 years 3 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman
121
Voted
WWW
2007
ACM
16 years 4 months ago
Mapping-driven XML transformation
Clio is an existing schema-mapping tool that provides user-friendly means to manage and facilitate the complex task of transformation and integration of heterogeneous data such as...
Haifeng Jiang, Howard Ho, Lucian Popa, Wook-Shin H...
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
15 years 8 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...