Sciweavers

15 search results - page 3 / 3
» A Safe Regression Test Selection Technique for Database-Driv...
Sort
View
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
13 years 10 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
AUSDM
2006
Springer
122views Data Mining» more  AUSDM 2006»
13 years 9 months ago
Analysis of Breast Feeding Data Using Data Mining Methods
The purpose of this study is to demonstrate the benefit of using common data mining techniques on survey data where statistical analysis is routinely applied. The statistical surv...
Hongxing He, Huidong Jin, Jie Chen, Damien McAulla...
SIGSOFT
2007
ACM
14 years 6 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
ICAC
2007
IEEE
13 years 11 months ago
Server-Level Power Control
We present a technique that controls the peak power consumption of a high-density server by implementing a feedback controller that uses precise, system-level power measurement to ...
Charles Lefurgy, Xiaorui Wang, Malcolm Ware
BMCBI
2008
160views more  BMCBI 2008»
13 years 5 months ago
A method for analyzing censored survival phenotype with gene expression data
Background: Survival time is an important clinical trait for many disease studies. Previous works have shown certain relationship between patients' gene expression profiles a...
Tongtong Wu, Wei Sun, Shinsheng Yuan, Chun-Houh Ch...