Sciweavers

563 search results - page 79 / 113
» constraints 2002
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 8 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
VLSID
2002
IEEE
123views VLSI» more  VLSID 2002»
14 years 8 months ago
Compiler-Directed Array Interleaving for Reducing Energy in Multi-Bank Memories
With the increased use of embedded/portable devices such as smart cellular phones, pagers, PDAs, hand-held computers, and CD players, improving energy efficiency is becoming a cri...
Victor Delaluz, Mahmut T. Kandemir, Narayanan Vija...
VLSID
2002
IEEE
92views VLSI» more  VLSID 2002»
14 years 8 months ago
Electromigration Avoidance in Analog Circuits: Two Methodologies for Current-Driven Routing
Interconnect with an insufficient width may be subject to electromigration and eventually cause the failure of the circuit at any time during its lifetime. This problem has gotten...
Jens Lienig, Goeran Jerke, Thorsten Adler
POPL
2002
ACM
14 years 8 months ago
Functional logic overloading
Functional logic overloading is a novel approach to userdefined overloading that extends Haskell's concept of type classes in significant ways. Whereas type classes are conce...
Matthias Neubauer, Peter Thiemann, Martin Gasbichl...
VLDB
2002
ACM
157views Database» more  VLDB 2002»
14 years 8 months ago
A formal perspective on the view selection problem
The view selection problem is to choose a set of views to materialize over a database schema, such that the cost of evaluating a set of workload queries is minimized and such that ...
Rada Chirkova, Alon Y. Halevy, Dan Suciu