Sciweavers

1782 search results - page 354 / 357
» A Data Transformation Method Based on Schema Mapping
Sort
View
CCS
2004
ACM
15 years 5 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
CGO
2010
IEEE
15 years 6 months ago
Automatic creation of tile size selection models
Tiling is a widely used loop transformation for exposing/exploiting parallelism and data locality. Effective use of tiling requires selection and tuning of the tile sizes. This is...
Tomofumi Yuki, Lakshminarayanan Renganarayanan, Sa...
88
Voted
LCTRTS
2007
Springer
15 years 5 months ago
Generalizing parametric timing analysis
In the design of real-time and embedded systems, it is important to establish a bound on the worst-case execution time (WCET) of programs to assure via schedulability analysis tha...
Joel Coffman, Christopher A. Healy, Frank Mueller,...
RSCTC
2000
Springer
197views Fuzzy Logic» more  RSCTC 2000»
15 years 3 months ago
Rough Set Approach to CBR
We discuss how Case Based Reasoning (CBR) (see e.g. [1], [4]) philosophy of adaptation of some known situations to new similar ones can be realized in rough set framework [5] for c...
Jan Wierzbicki
BMCBI
2011
14 years 6 months ago
Estimating developmental states of tumors and normal tissues using a linear time-ordered model
Background: Tumor cells are considered to have an aberrant cell state, and some evidence indicates different development states appearing in the tumorigenesis. Embryonic developme...
Bo Zhang, Beibei Chen, Tao Wu, Zhenyu Xuan, Xiaope...