Sciweavers

6318 search results - page 1185 / 1264
» Data Leakage Detection
Sort
View
120
Voted
TAPSOFT
1995
Springer
15 years 5 months ago
Anatomy of the Pentium Bug
The Pentium computer chip’s division algorithm relies on a table from which five entries were inadvertently omitted, with the result that 1738 single precision dividenddivisor ...
Vaughan R. Pratt
121
Voted
COMPGEOM
1987
ACM
15 years 5 months ago
Polygon Properties Calculated from the Vertex Neighborhoods
Calculating properties of polyhedra given only the set of the locations and neighborhoods of the vertices is easy. Possible properties include volume, surface area, and point cont...
Wm. Randolph Franklin
116
Voted
ICDE
2010
IEEE
206views Database» more  ICDE 2010»
15 years 3 months ago
HECATAEUS: Regulating Schema Evolution
HECATAEUS is an open-source software tool for enabling impact prediction, what-if analysis, and regulation of relational database schema evolution. We follow a graph theoretic appr...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
AUSDM
2008
Springer
274views Data Mining» more  AUSDM 2008»
15 years 3 months ago
Identifying Stock Similarity Based on Multi-event Episodes
Predicting stock market movements is always difficult. Investors try to guess a stock's behavior, but it often backfires. Thumb rules and intuition seems to be the major indi...
Abhi Dattasharma, Praveen Kumar Tripathi, Sridhar ...
CONEXT
2008
ACM
15 years 3 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...
« Prev « First page 1185 / 1264 Last » Next »