Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,789,272 papers from all fields of science
Search
Sign In
Create Free Account
Data dredging
Known as:
Data dredge
, Data snooping
, P-hacking
Expand
Data dredging (also data fishing, data snooping, and p-hacking) is the use of data mining to uncover patterns in data that can be presented as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Correlation does not imply causation
Kitchen sink regression
Overfitting
Selection bias
Expand
Broader (2)
Data mining
Design of experiments
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Posterior-Hacking: Selective Reporting Invalidates Bayesian Results Also
U. Simonsohn
2014
Corpus ID: 60280796
Many believe that Bayesian statistics are robust to p-hacking. Many are wrong. In this paper I show with simulations and actual…
Expand
Highly Cited
2010
Highly Cited
2010
SWEL: Hardware cache coherence protocols to map shared data onto shared caches
Seth H. Pugsley
,
J. Spjut
,
D. Nellans
,
R. Balasubramonian
International Conference on Parallel…
2010
Corpus ID: 7350052
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design…
Expand
Highly Cited
2008
Highly Cited
2008
An OS-based alternative to full hardware coherence on tiled CMPs
Christian Fensch
,
Marcelo H. Cintra
IEEE 14th International Symposium on High…
2008
Corpus ID: 710300
The interconnect mechanisms (shared bus or crossbar) used in current chip-multiprocessors (CMPs) are expected to become a…
Expand
2007
2007
LIVE data workspace: A flexible, dynamic and extensible platform for petascale applications
H. Abbasi
,
M. Wolf
,
K. Schwan
IEEE International Conference on Cluster…
2007
Corpus ID: 15056328
The data needs of current and future PetaScale applications have increased over the last half decade to the extent that…
Expand
2005
2005
Database-aware semantically-smart storage
Muthian Sivathanu
,
Lakshmi N. Bairavasundaram
,
Andrea C. Arpaci-Dusseau
,
Remzi H. Arpaci-Dusseau
USENIX Conference on File and Storage…
2005
Corpus ID: 16833150
Recent research has demonstrated the potential benefits of building storage arrays that understand the file systems above them…
Expand
2004
2004
Integrated temporal and spatial scheduling for extended operand clustered VLIW processors
Rahul Nagpal
,
Y. Srikant
ACM International Conference on Computing…
2004
Corpus ID: 14502473
Centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption and are thus not…
Expand
Highly Cited
2000
Highly Cited
2000
A single-chip, 1.6-billion, 16-b MAC/s multiprocessor DSP
B. Ackland
,
A. Anesko
,
+13 authors
Joseph Williams
IEEE Journal of Solid-State Circuits
2000
Corpus ID: 527672
An MIMD multiprocessor digital signal-processing (DSP) chip containing four 64-b processing elements (PE's) interconnected by a…
Expand
2000
2000
Timestamp snooping: an approach for extending SMPs
Milo M. K. Martin
,
Daniel J. Sorin
,
+7 authors
D. Wood
International Conference on Architectural Support…
2000
Corpus ID: 53224608
Symmetric muultiprocessor (SMP) servers provide superior performance for the commercial workloads that dominate the Internet. Our…
Expand
Highly Cited
1999
Highly Cited
1999
A single-chip 1.6 billion 16-b MAC/s multiprocessor DSP
B. Ackland
,
A. Anesko
,
+13 authors
Joseph Jay Williams
Proceedings of the IEEE Custom Integrated…
1999
Corpus ID: 70139877
A MIMD multiprocessor DSP chip containing four 64-b processing elements (PEs) interconnected by a 128-b pipelined split…
Expand
1995
1995
Boosting the performance of hybrid snooping cache protocols
F. Dahlgren
Proceedings 22nd Annual International Symposium…
1995
Corpus ID: 12837856
Previous studies of bus-based shared-memory multiprocessors have shown hybrid write-invalidate/write-update snooping protocols to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE