Skip to search formSkip to main contentSkip to account menu

Data dredging

Known as: Data dredge, Data snooping, P-hacking 
Data dredging (also data fishing, data snooping, and p-hacking) is the use of data mining to uncover patterns in data that can be presented as… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Many believe that Bayesian statistics are robust to p-hacking. Many are wrong. In this paper I show with simulations and actual… 
Highly Cited
2010
Highly Cited
2010
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design… 
Highly Cited
2008
Highly Cited
2008
The interconnect mechanisms (shared bus or crossbar) used in current chip-multiprocessors (CMPs) are expected to become a… 
2007
2007
The data needs of current and future PetaScale applications have increased over the last half decade to the extent that… 
2004
2004
Centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption and are thus not… 
2004
2004
Equivalence tests evaluate whether a treatment effect lies within or outside a predetermined equivalence interval. The… 
2001
2001
Many authors discovered that simple forms of technical analysis possessed significant forecast power on various market indexes… 
2000
2000
Symmetric muultiprocessor (SMP) servers provide superior performance for the commercial workloads that dominate the Internet. Our… 
Highly Cited
1999
Highly Cited
1999
A MIMD multiprocessor DSP chip containing four 64-b processing elements (PEs) interconnected by a 128-b pipelined split… 
1995
1995
  • F. Dahlgren
  • 1995
  • Corpus ID: 12837856
Previous studies of bus-based shared-memory multiprocessors have shown hybrid write-invalidate/write-update snooping protocols to…