Sciweavers

57 search results - page 9 / 12
» Place-Boundedness for Vector Addition Systems with one zero-...
Sort
View
SIGMOD
2008
ACM
158views Database» more  SIGMOD 2008»
15 years 9 months ago
Column-stores vs. row-stores: how different are they really?
There has been a significant amount of excitement and recent work on column-oriented database systems ("column-stores"). These database systems have been shown to perfor...
Daniel J. Abadi, Samuel Madden, Nabil Hachem
DEXA
2000
Springer
132views Database» more  DEXA 2000»
15 years 1 months ago
Improving the Performance of High-Energy Physics Analysis through Bitmap Indices
Abstract. Bitmap indices are popular multi-dimensional data structures for accessing read-mostly data such as data warehouse (DW) applications, decision support systems (DSS) and o...
Kurt Stockinger, Dirk Düllmann, Wolfgang Hosc...
BMCBI
2010
111views more  BMCBI 2010»
14 years 9 months ago
Protein sequences classification by means of feature extraction with substitution matrices
Background: This paper deals with the preprocessing of protein sequences for supervised classification. Motif extraction is one way to address that task. It has been largely used ...
Rabie Saidi, Mondher Maddouri, Engelbert Mephu Ngu...
ICA
2007
Springer
15 years 3 months ago
Compressed Sensing and Source Separation
Abstract. Separation of underdetermined mixtures is an important problem in signal processing that has attracted a great deal of attention over the years. Prior knowledge is requir...
Thomas Blumensath, Mike E. Davies
85
Voted
NSDI
2008
14 years 12 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...