Sciweavers

877 search results - page 145 / 176
» A Multi-metric Similarity Based Analysis of Microarray Data
Sort
View
ICCVW
1999
Springer
15 years 4 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson
CONEXT
2007
ACM
15 years 3 months ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...
ICDCS
2010
IEEE
15 years 3 months ago
A New Buffer Cache Design Exploiting Both Temporal and Content Localities
: This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as refe...
Jin Ren, Qing Yang
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 3 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
CHI
1995
ACM
15 years 3 months ago
Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information
Many interfaces allow users to manipulate graphical objects, icons representing underlying data or the data themselves, against a spatial backdrop or canvas. Users take advantage ...
Frank M. Shipman III, Catherine C. Marshall, Thoma...