Sciweavers

1296 search results - page 90 / 260
» Multiplicative Background Risk
Sort
View
179
Voted
ICDE
2004
IEEE
85views Database» more  ICDE 2004»
16 years 2 months ago
GODIVA: Lightweight Data Management for Scientific Visualization Applications
Scientific visualization applications are very dataintensive, with high demands for I/O and data management. Developers of many visualization tools hesitate to use traditional DBM...
Xiaosong Ma, Marianne Winslett, John Norris, Xiang...
101
Voted
ISBI
2006
IEEE
16 years 1 months ago
Sample dependence correction for order selection in fMRI analysis
Multivariate analysis methods such as independent component analysis (ICA) have been applied to the analysis of functional magnetic resonance imaging (fMRI) data to study the brai...
Tülay Adali, Vince D. Calhoun, Yi-Ou Li
98
Voted
ICSE
2005
IEEE-ACM
16 years 21 days ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
100
Voted
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
15 years 9 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
93
Voted
ICCD
2002
IEEE
146views Hardware» more  ICCD 2002»
15 years 9 months ago
From ASIC to ASIP: The Next Design Discontinuity
A variety of factors is making it increasingly difficult and expensive to design and manufacture traditional Application Specific Integrated Circuits (ASICs). This has started a s...
Kurt Keutzer, Sharad Malik, A. Richard Newton