Sciweavers

1298 search results - page 185 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
110
Voted
ICCAD
2005
IEEE
131views Hardware» more  ICCAD 2005»
16 years 9 days ago
Code restructuring for improving cache performance of MPSoCs
— One of the critical goals in code optimization for MPSoC architectures is to minimize the number of off-chip memory accesses. This is because such accesses can be extremely cos...
Guilin Chen, Mahmut T. Kandemir
134
Voted
BMCBI
2008
171views more  BMCBI 2008»
15 years 3 months ago
Fuzzy association rules for biological data analysis: A case study on yeast
Background: Last years' mapping of diverse genomes has generated huge amounts of biological data which are currently dispersed through many databases. Integration of the info...
Francisco J. Lopez, Armando Blanco, Fernando Garci...
126
Voted
CCGRID
2005
IEEE
15 years 9 months ago
The QuarkNet/grid collaborative learning e-Lab
We describe a case study that uses grid computing techniques to support the collaborative learning of high school students investigating cosmic rays. Students gather and upload sc...
Marjorie Bardeen, Eric Gilbert, Thomas Jordan, Pau...
CORR
2004
Springer
208views Education» more  CORR 2004»
15 years 3 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
16 years 3 months ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian