Sciweavers

909 search results - page 163 / 182
» Managing Requirements for Business Value
Sort
View
MICRO
1997
IEEE
86views Hardware» more  MICRO 1997»
15 years 2 months ago
Streamlining Inter-Operation Memory Communication via Data Dependence Prediction
We revisit memory hierarchy design viewing memory as an inter-operation communication agent. This perspective leads to the development of novel methods of performing inter-operati...
Andreas Moshovos, Gurindar S. Sohi
CIKM
2009
Springer
15 years 4 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
WINET
2010
178views more  WINET 2010»
14 years 4 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
KDD
2004
ACM
164views Data Mining» more  KDD 2004»
15 years 10 months ago
Ordering patterns by combining opinions from multiple sources
Pattern ordering is an important task in data mining because the number of patterns extracted by standard data mining algorithms often exceeds our capacity to manually analyze the...
Pang-Ning Tan, Rong Jin
OSDI
2004
ACM
15 years 10 months ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...