Sciweavers

118 search results - page 18 / 24
» Design, Testing, and Applications of Digital Microfluidics-B...
Sort
View
83
Voted
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
15 years 10 months ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
ACMDIS
2006
ACM
15 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
CIKM
2008
Springer
14 years 11 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
DAC
2007
ACM
15 years 10 months ago
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement
Negative bias temperature instability (NBTI) in MOSFETs is one of the major reliability challenges in nano-scale technology. This paper presents an efficient technique to characte...
Kunhyuk Kang, Kee-Jong Kim, Ahmad E. Islam, Muhamm...
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 3 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan