Sciweavers

1056 search results - page 2 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
KDD
2004
ACM
134views Data Mining» more  KDD 2004»
14 years 5 months ago
Exploiting a support-based upper bound of Pearson's correlation coefficient for efficiently identifying strongly correlated pair
Given a user-specified minimum correlation threshold and a market basket database with N items and T transactions, an all-strong-pairs correlation query finds all item pairs with...
Hui Xiong, Shashi Shekhar, Pang-Ning Tan, Vipin Ku...
IEEESCC
2006
IEEE
13 years 11 months ago
On Exploiting System Dynamics Modeling to Identify Service Requirements
SOA provides a flexible framework for betterintegrated systems that meet business needs. However, the existing methods are not successful in helping business analysts to devise ap...
Lianjun An, Jun-Jang Jeng, Cagdas E. Gerede
CN
2007
141views more  CN 2007»
13 years 5 months ago
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics
In this paper, we consider the problem of estimating link loss rates based on end-to-end path loss rates in order to identify lossy links on the network. We first derive a maximu...
Hyuk Lim, Jennifer C. Hou
IAT
2005
IEEE
13 years 10 months ago
Exploiting Multi-Agent Interactions for Identifying the Best-Payoff Information Source
In many different applications on the Web, distributed agents would like to discover and access high quality information sources. This is a challenging problem since an agent does...
Young-Woo Seo, Katia P. Sycara
SC
2003
ACM
13 years 10 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...