Sciweavers

6129 search results - page 1104 / 1226
» A parallel LLL algorithm
Sort
View
126
Voted
ISBI
2008
IEEE
16 years 1 months ago
Brain surface conformal parameterization with the slit mapping
Brain surface conformal mapping has been studied intensively. In this paper, we propose a method that computes a conformal mapping from a multiply connected mesh to the so-called ...
Yalin Wang, Xianfeng Gu, Tony F. Chan, Paul M. Tho...
96
Voted
WWW
2008
ACM
16 years 1 months ago
Asymmetrical query recommendation method based on bipartite network resource allocation
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we ...
Zhiyuan Liu, Maosong Sun
101
Voted
HPCA
2009
IEEE
16 years 1 months ago
Eliminating microarchitectural dependency from Architectural Vulnerability
The Architectural Vulnerability Factor (AVF) of a hardware structure is the probability that a fault in the structure will affect the output of a program. AVF captures both microa...
Vilas Sridharan, David R. Kaeli
85
Voted
HPCA
2009
IEEE
16 years 1 months ago
Variation-aware dynamic voltage/frequency scaling
Fine-grained dynamic voltage/frequency scaling (DVFS) is an important tool in managing the balance between power and performance in chip-multiprocessors. Although manufacturing pr...
Sebastian Herbert, Diana Marculescu
120
Voted
KDD
2002
ACM
179views Data Mining» more  KDD 2002»
16 years 1 months ago
Combining clustering and co-training to enhance text classification using unlabelled data
In this paper, we present a new co-training strategy that makes use of unlabelled data. It trains two predictors in parallel, with each predictor labelling the unlabelled data for...
Bhavani Raskutti, Herman L. Ferrá, Adam Kow...
« Prev « First page 1104 / 1226 Last » Next »