Sciweavers

1298 search results - page 239 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
MICRO
1999
IEEE
131views Hardware» more  MICRO 1999»
15 years 6 months ago
Value Prediction for Speculative Multithreaded Architectures
The speculative multithreading paradigm (speculative threadlevel parallelism) is based on the concurrent execution of control-speculative threads. The efficiency of microarchitect...
Pedro Marcuello, Jordi Tubella, Antonio Gonz&aacut...
PC
2006
124views Management» more  PC 2006»
15 years 1 months ago
Message-passing code generation for non-rectangular tiling transformations
Tiling is a well known loop transformation used to reduce communication overhead in distributed memory machines. Although a lot of theoretical research has been done concerning th...
Georgios I. Goumas, Nikolaos Drosinos, Maria Athan...
SIAMSC
2008
173views more  SIAMSC 2008»
15 years 1 months ago
A Fast Iterative Method for Eikonal Equations
In this paper we propose a novel computational technique to solve the Eikonal equation. The proposed method manages the list of active nodes and iteratively updates the solutions ...
Won-Ki Jeong, Ross T. Whitaker
156
Voted
ICDM
2010
IEEE
267views Data Mining» more  ICDM 2010»
14 years 12 months ago
Personalizing Web Page Recommendation via Collaborative Filtering and Topic-Aware Markov Model
Web-page recommendation is to predict the next request of pages that Web users are potentially interested in when surfing the Web. This technique can guide Web users to find more u...
Qingyan Yang, Ju Fan, Jianyong Wang, Lizhu Zhou
217
Voted
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 2 months ago
Exploiting context analysis for combining multiple entity resolution systems
Entity Resolution (ER) is an important real world problem that has attracted significant research interest over the past few years. It deals with determining which object descript...
Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotr...