Sciweavers

70 search results - page 4 / 14
» Characterizing and Exploiting Reference Locality in Data Str...
Sort
View
IDA
2006
Springer
14 years 9 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
EDBT
2006
ACM
150views Database» more  EDBT 2006»
15 years 9 months ago
On Futuristic Query Processing in Data Streams
Recent advances in hardware technology have resulted in the ability to collect and process large amounts of data. In many cases, the collection of the data is a continuous process ...
Charu C. Aggarwal
MICRO
1997
IEEE
79views Hardware» more  MICRO 1997»
15 years 1 months ago
On High-Bandwidth Data Cache Design for Multi-Issue Processors
Highly aggressive multi-issue processor designs of the past few years and projections for the next decade require that we redesign the operation of the cache memory system. The nu...
Jude A. Rivers, Gary S. Tyson, Edward S. Davidson,...
ISCA
2007
IEEE
161views Hardware» more  ISCA 2007»
15 years 4 months ago
Physical simulation for animation and visual effects: parallelization and characterization for chip multiprocessors
We explore the emerging application area of physics-based simulation for computer animation and visual special effects. In particular, we examine its parallelization potential and...
Christopher J. Hughes, Radek Grzeszczuk, Eftychios...
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...