Sciweavers

198 search results - page 39 / 40
» Source Codes as Random Number Generators
Sort
View
VLSISP
2008
173views more  VLSISP 2008»
13 years 5 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
SDM
2012
SIAM
281views Data Mining» more  SDM 2012»
11 years 7 months ago
Contextual Collaborative Filtering via Hierarchical Matrix Factorization
Matrix factorization (MF) has been demonstrated to be one of the most competitive techniques for collaborative filtering. However, state-of-the-art MFs do not consider contextual...
ErHeng Zhong, Wei Fan, Qiang Yang
BMCBI
2010
142views more  BMCBI 2010»
13 years 5 months ago
pplacer: linear time maximum-likelihood and Bayesian phylogenetic placement of sequences onto a fixed reference tree
Background: Likelihood-based phylogenetic inference is generally considered to be the most reliable classification method for unknown sequences. However, traditional likelihood-ba...
Frederick A. Matsen III, Robin B. Kodner, E. Virgi...
ASPLOS
2009
ACM
13 years 9 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 5 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel