Sciweavers

1789 search results - page 115 / 358
» New analysis and results for the Frank-Wolfe method
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 8 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
SPAA
2006
ACM
15 years 7 months ago
A performance analysis of local synchronization
Synchronization is often necessary in parallel computing, but it can create delays whenever the receiving processor is idle, waiting for the information to arrive. This is especia...
Julia Lipman, Quentin F. Stout
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 6 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
JBI
2006
107views Bioinformatics» more  JBI 2006»
15 years 1 months ago
Knowledge guided analysis of microarray data
To microarray expression data analysis, it is well accepted that biological knowledge-guided clustering techniques show more advantages than pure mathematical techniques. In this ...
Zhuo Fang, Jiong Yang, Yixue Li, Qing-ming Luo, Le...
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 3 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...