Sciweavers

1575 search results - page 244 / 315
» The provenance of electronic data
Sort
View
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 9 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....
SIAMMAX
2010
189views more  SIAMMAX 2010»
13 years 4 months ago
Fast Algorithms for the Generalized Foley-Sammon Discriminant Analysis
Linear Discriminant Analysis (LDA) is one of the most popular approaches for feature extraction and dimension reduction to overcome the curse of the dimensionality of the high-dime...
Lei-Hong Zhang, Li-Zhi Liao, Michael K. Ng
AAAI
2012
12 years 11 days ago
A Novel and Scalable Spatio-Temporal Technique for Ocean Eddy Monitoring
Swirls of ocean currents known as ocean eddies are a crucial component of the ocean’s dynamics. In addition to dominating the ocean’s kinetic energy, eddies play a significan...
James H. Faghmous, Yashu Chamber, Shyam Boriah, Fr...
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 10 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 10 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik