Sciweavers

1534 search results - page 167 / 307
» Application of data warehouse technology in power analysis
Sort
View
LCTRTS
2010
Springer
15 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
WIDM
2006
ACM
15 years 4 months ago
An architecture for creating collaborative semantically capable scientific data sharing infrastructures
Increasingly, scientists are seeking to collaborate and share data among themselves. Such sharing is can be readily done by publishing data on the World-Wide Web. Meaningful query...
Anuj R. Jaiswal, C. Lee Giles, Prasenjit Mitra, Ja...
VISUALIZATION
1995
IEEE
15 years 1 months ago
Recursive Pattern: A Technique for Visualizing Very Large Amounts of Data
Animportantgoalofvisualizationtechnologyistosupport the exploration and analysis of very large amounts of data. In this paper, we propose a new visualization technique called ‘r...
Daniel A. Keim, Mihael Ankerst, Hans-Peter Kriegel
144
Voted
AMINING
2003
Springer
293views Data Mining» more  AMINING 2003»
15 years 3 months ago
Data Mining Oriented CRM Systems Based on MUSASHI: C-MUSASHI
Abstract. MUSASHI is a set of commands which enables us to efficiently execute various types of data manipulations in a flexible manner, mainly aiming at data processing of huge a...
Katsutoshi Yada, Yukinobu Hamuro, Naoki Katoh, Tak...
DOLAP
2006
ACM
15 years 4 months ago
Enhanced mining of association rules from data cubes
On-line analytical processing (OLAP) provides tools to explore and navigate into data cubes in order to extract interesting information. Nevertheless, OLAP is not capable of expla...
Riadh Ben Messaoud, Sabine Loudcher Rabaséd...