Sciweavers

52 search results - page 10 / 11
» Using Non-Negative Matrix Factorization for Removing Show-Th...
Sort
View
TON
2008
76views more  TON 2008»
13 years 5 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun
QRE
2010
84views more  QRE 2010»
13 years 4 months ago
Three-level and mixed-level orthogonal arrays for lean designs
Orthogonal arrays (OA’s) are widely used in design of experiments. Each OA has a specific number of rows that is fixed by the number of factors in the OA and the number of leve...
Chang-Xing Ma, Ming-Yao Ai, L. Y. Chan, T. N. Goh
ICCAD
2009
IEEE
133views Hardware» more  ICCAD 2009»
13 years 3 months ago
A parallel preconditioning strategy for efficient transistor-level circuit simulation
A parallel computing approach for large-scale SPICE-accurate circuit simulation is described that is based on a new preconditioned iterative solver. The preconditioner involves the...
Heidi Thornquist, Eric R. Keiter, Robert J. Hoekst...
SACMAT
2010
ACM
13 years 10 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
CIDM
2007
IEEE
14 years 4 days ago
Measuring the Validity of Document Relations Discovered from Frequent Itemset Mining
— The extension approach of frequent itemset mining can be applied to discover the relations among documents. Several schemes, i.e., n-gram, stemming, stopword removal and term w...
Kritsada Sriphaew, Thanaruk Theeramunkong