Sciweavers

1298 search results - page 190 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
138
Voted
WWW
2008
ACM
16 years 4 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
VTC
2008
IEEE
15 years 9 months ago
Performance of Dedicated Indoor MIMO HSDPA Systems
—MIMO and higher-order modulation (64-QAM) have recently been introduced in the HSPA downlink (HSDPA) to extend peak data rates. Both techniques demand a high SINR operating poin...
Karl J. Molnar, Stephen J. Grant
ASAP
2004
IEEE
119views Hardware» more  ASAP 2004»
15 years 7 months ago
Automatic Synthesis of Customized Local Memories for Multicluster Application Accelerators
Distributed local memories, or scratchpads, have been shown to effectively reduce cost and power consumption of application-specific accelerators while maintaining performance. Th...
Manjunath Kudlur, Kevin Fan, Michael L. Chu, Scott...
118
Voted
PVLDB
2010
129views more  PVLDB 2010»
15 years 1 months ago
Entity Resolution with Evolving Rules
Entity resolution (ER) identifies database records that refer to the same real world entity. In practice, ER is not a one-time process, but is constantly improved as the data, sc...
Steven Whang, Hector Garcia-Molina
ISPASS
2007
IEEE
15 years 9 months ago
Reverse State Reconstruction for Sampled Microarchitectural Simulation
For simulation, a tradeoff exists between speed and accuracy. The more instructions simulated from the workload, the more accurate the results — but at a higher cost. To reduce ...
Paul D. Bryan, Michel C. Rosier, Thomas M. Conte