Sciweavers

1024 search results - page 45 / 205
» Value complete, column complete, predicate complete
Sort
View
IEEEARES
2010
IEEE
15 years 8 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
DATE
2004
IEEE
126views Hardware» more  DATE 2004»
15 years 5 months ago
Low Static-Power Frequent-Value Data Caches
: Static energy dissipation in cache memories will constitute an increasingly larger portion of total microprocessor energy dissipation due to nanoscale technology characteristics ...
Chuanjun Zhang, Jun Yang 0002, Frank Vahid
ICML
1997
IEEE
16 years 2 months ago
Learning Belief Networks in the Presence of Missing Values and Hidden Variables
In recent years there has been a flurry of works on learning probabilistic belief networks. Current state of the art methods have been shown to be successful for two learning scen...
Nir Friedman
ISMM
2009
Springer
15 years 8 months ago
A Directional Rouy-Tourin Scheme for Adaptive Matrix-Valued Morphology
In order to describe anisotropy in image processing models or physical measurements, matrix fields are a suitable choice. In diffusion tensor magnetic resonance imaging (DT-MRI),...
Luis Pizarro, Bernhard Burgeth, Michael Breuß...
MICRO
1999
IEEE
123views Hardware» more  MICRO 1999»
15 years 5 months ago
Improving Branch Predictors by Correlating on Data Values
Branch predictors typically use combinations of branch PC bits and branch histories to make predictions. Recent improvements in branch predictors have come from reducing the effec...
Timothy H. Heil, Zak Smith, James E. Smith