Sciweavers

1125 search results - page 68 / 225
» Dependability in Aggregation by Averaging
Sort
View
MICRO
1996
IEEE
96views Hardware» more  MICRO 1996»
15 years 2 months ago
Exceeding the Dataflow Limit via Value Prediction
For decades, the serialization constraints imposed by true data dependences have been regarded as an absolute limit--the dataflow limit--on the parallel execution of serial progra...
Mikko H. Lipasti, John Paul Shen
GLOBECOM
2010
IEEE
14 years 8 months ago
Energy-Efficient Power Loading for a MIMO-SVD System and Its Performance in Flat Fading
In this paper we formulate a power loading problem for the spatial subchannels (parallel channels) of a single-carrier MIMO-SVD system. The power loading solution is designed to mi...
Raghavendra S. Prabhu, Babak Daneshrad
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
15 years 10 months ago
Closing the key loophole in MLS databases
: There has been an abundance of research within the last couple of decades in the area of multilevel secure (MLS) databases. Recent work in this field deals with the processing of...
Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
ICPR
2008
IEEE
15 years 4 months ago
Spam filtering with several novel bayesian classifiers
In this paper, we report our work on spam filtering with three novel bayesian classification methods: Aggregating One-Dependence Estimators (AODE), Hidden Naïve Bayes (HNB), Loca...
Chuanliang Chen, Yingjie Tian, Chunhua Zhang
IEEEARES
2008
IEEE
15 years 4 months ago
Quantitative Assessment of Enterprise Security System
—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...