Sciweavers

8135 search results - page 1596 / 1627
» networking 2008
Sort
View
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 27 days ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
109
Voted
HPCA
2008
IEEE
16 years 25 days ago
Performance and power optimization through data compression in Network-on-Chip architectures
The trend towards integrating multiple cores on the same die has accentuated the need for larger on-chip caches. Such large caches are constructed as a multitude of smaller cache ...
Reetuparna Das, Asit K. Mishra, Chrysostomos Nicop...
204
Voted
POPL
2008
ACM
16 years 24 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
73
Voted
RECOMB
2008
Springer
16 years 24 days ago
Bootstrapping the Interactome: Unsupervised Identification of Protein Complexes in Yeast
Protein interactions and complexes are major components of biological systems. Recent genome-wide applications of tandem affinity purification (TAP) in yeast have increased signifi...
Caroline C. Friedel, Jan Krumsiek, Ralf Zimmer
102
Voted
OSDI
2008
ACM
16 years 23 days ago
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for providing diagnostic tools and performance metrics. Thes...
Chas DiFatta, Mark Poepping, Daniel V. Klein
« Prev « First page 1596 / 1627 Last » Next »