Sciweavers

12 search results - page 1 / 3
» Internalism, externalism, and transcendental idealism
Sort
View
SPAA
2009
ACM
14 years 5 months ago
Dynamic external hashing: the limit of buffering
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query perf...
Zhewei Wei, Ke Yi, Qin Zhang
IEEEIAS
2009
IEEE
13 years 11 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...
SDM
2012
SIAM
216views Data Mining» more  SDM 2012»
11 years 7 months ago
Feature Selection "Tomography" - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable
:  Feature Selection “Tomography” - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable George Forman HP Laboratories HPL-2010-19R1 Feature selection; ...
George Forman
VLSID
2005
IEEE
126views VLSI» more  VLSID 2005»
14 years 5 months ago
Exact Analytical Equations for Predicting Nonlinear Phase Errors and Jitter in Ring Oscillators
In this paper, we present a simple analytical equation for capturing phase errors in 3-stage ring oscillators. The model, based on a simple but useful idealization of the ring osc...
Jaijeet S. Roychowdhury