Sciweavers

3359 search results - page 402 / 672
» A Simplified Idea Algorithm
Sort
View
97
Voted
EUROPAR
2007
Springer
15 years 6 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
103
Voted
SARA
2007
Springer
15 years 6 months ago
Computing and Using Lower and Upper Bounds for Action Elimination in MDP Planning
Abstract. We describe a way to improve the performance of MDP planners by modifying them to use lower and upper bounds to eliminate non-optimal actions during their search. First, ...
Ugur Kuter, Jiaqiao Hu
DASFAA
2006
IEEE
126views Database» more  DASFAA 2006»
15 years 6 months ago
An Efficient Approach for Mining Top-K Fault-Tolerant Repeating Patterns
Abstract. In this paper, an efficient strategy for mining top-K non-trivial faulttolerant repeating patterns (FT-RPs in short) with lengths no less than min_len from data sequences...
Jia-Ling Koh, Yu-Ting Kung
113
Voted
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 6 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
82
Voted
CVPR
2005
IEEE
15 years 6 months ago
Ordinal Palmprint Represention for Personal Identification
Palmprint-based personal identification, as a new member in the biometrics family, has become an active research topic in recent years. Although great progress has been made, how ...
Zhenan Sun, Tieniu Tan, Yunhong Wang, Stan Z. Li