Sciweavers

349 search results - page 54 / 70
» Transactional Computation: Overview and Discussion
Sort
View
73
Voted
APPINF
2003
14 years 11 months ago
Requirement Indicators for Mobile Work: The MOWAHS Approach
This paper describes eight requirement indicators derived from a mobile work characterisation framework (MWCF). The MWCF is a framework for analysing mobile scenarios (mobile task...
Heri Ramampiaro, Alf Inge Wang, Carl-Fredrik S&osl...
FTDB
2007
95views more  FTDB 2007»
14 years 9 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...
ANOR
2005
131views more  ANOR 2005»
14 years 9 months ago
Projection, Lifting and Extended Formulation in Integer and Combinatorial Optimization
Abstract. This is an overview of the significance and main uses of projection, lifting and extended formulation in integer and combinatorial optimization. Its first two sections de...
Egon Balas
DAC
1998
ACM
15 years 10 months ago
Reducing Power in High-Performance Microprocessors
Power consumption has become one of the biggest challenges in high-performance microprocessor design. The rapid increase in the complexity and speed of each new CPU generation is ...
Vivek Tiwari, Deo Singh, Suresh Rajgopal, Gaurav M...
97
Voted
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham