Sciweavers

154 search results - page 10 / 31
» Probabilistic modeling of data cache behavior
Sort
View
TSMC
2002
134views more  TSMC 2002»
14 years 10 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
HPCA
2005
IEEE
15 years 11 months ago
Using Virtual Load/Store Queues (VLSQs) to Reduce the Negative Effects of Reordered Memory Instructions
The use of large instruction windows coupled with aggressive out-oforder and prefetching capabilities has provided significant improvements in processor performance. In this paper...
Aamer Jaleel, Bruce L. Jacob
CAISE
2006
Springer
15 years 2 months ago
Managing Source Quality Changes in a Data Integration System
This thesis addresses the problem of source quality changes in Data Integration Systems. Its main goal is to propose techniques for maintaining as much as possible the satisfaction...
Adriana Marotta
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 4 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
KBS
2007
103views more  KBS 2007»
14 years 11 months ago
Eye-tracking for user modeling in exploratory learning environments: An empirical evaluation
In this paper, we describe research on using eye-tracking data for on-line assessment of user meta-cognitive behavior during interaction with an environment for exploration-based ...
Cristina Conati, Christina Merten