Sciweavers

1024 search results - page 130 / 205
» Value complete, column complete, predicate complete
Sort
View
VIS
2008
IEEE
134views Visualization» more  VIS 2008»
16 years 1 months ago
A Practical Approach to Morse-Smale Complex Computation: Scalability and Generality
The Morse-Smale (MS) complex has proven to be a useful tool in extracting and visualizing features from scalar-valued data. However, efficient computation of the MS complex for lar...
Attila Gyulassy, Peer-Timo Bremer, Bernd Hamann,...
DAC
1998
ACM
16 years 26 days ago
Maximum Power Estimation Using the Limiting Distributions of Extreme Order Statistics
In this paper we present a statistical method for estimating the maximum power consumption in VLSI circuits. The method is based on the theory of extreme order statistics applied ...
Qinru Qiu, Qing Wu, Massoud Pedram
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 9 days ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
CADE
2005
Springer
16 years 6 days ago
The Decidability of the First-Order Theory of Knuth-Bendix Order
Two kinds of orderings are widely used in term rewriting and theorem proving, namely recursive path ordering (RPO) and Knuth-Bendix ordering (KBO). They provide powerful tools to p...
Ting Zhang, Henny B. Sipma, Zohar Manna
SIGMOD
2004
ACM
103views Database» more  SIGMOD 2004»
16 years 1 days ago
A Read-Only Transaction Anomaly Under Snapshot Isolation
Snapshot Isolation (SI), is a multi-version concurrency control algorithm introduced in [BBGMOO95] and later implemented by Oracle. SI avoids many concurrency errors, and it never ...
Alan Fekete, Elizabeth J. O'Neil, Patrick E. O'Nei...