Sciweavers

4330 search results - page 797 / 866
» Analyzing security architectures
Sort
View
CORR
2004
Springer
208views Education» more  CORR 2004»
14 years 10 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
157
Voted
VLSISP
2011
358views Database» more  VLSISP 2011»
14 years 5 months ago
Accelerating Machine-Learning Algorithms on FPGAs using Pattern-Based Decomposition
Machine-learning algorithms are employed in a wide variety of applications to extract useful information from data sets, and many are known to suffer from superlinear increases in ...
Karthik Nagarajan, Brian Holland, Alan D. George, ...
92
Voted
TON
2012
13 years 18 days ago
Taming the Mobile Data Deluge With Drop Zones
—Human communication has changed by the advent of smartphones. Using commonplace mobile device features they started uploading large amounts of content that increases. This incre...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
121
Voted
BMCBI
2011
14 years 5 months ago
LabKey Server: An open source platform for scientific data integration, analysis and collaboration
Background: Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia t...
Elizabeth K. Nelson, Britt Piehler, Josh Eckels, A...
89
Voted
DAC
2002
ACM
15 years 11 months ago
Design of a high-throughput low-power IS95 Viterbi decoder
The design of high-throughput large-state Viterbi decoders relies on the use of multiple arithmetic units. The global communication channels among these parallel processors often ...
Xun Liu, Marios C. Papaefthymiou