Sciweavers

18306 search results - page 3396 / 3662
» Algorithmics in Exponential Time
Sort
View
155
Voted
SC
2009
ACM
15 years 9 months ago
Enabling high-fidelity neutron transport simulations on petascale architectures
The UNIC code is being developed as part of the DOE’s Nuclear Energy Advanced Modeling and Simulation (NEAMS) program. UNIC is an unstructured, deterministic neutron transport c...
Dinesh K. Kaushik, Micheal Smith, Allan Wollaber, ...
135
Voted
WSDM
2009
ACM
191views Data Mining» more  WSDM 2009»
15 years 9 months ago
Generating labels from clicks
The ranking function used by search engines to order results is learned from labeled training data. Each training point is a (query, URL) pair that is labeled by a human judge who...
Rakesh Agrawal, Alan Halverson, Krishnaram Kenthap...
147
Voted
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
15 years 9 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
150
Voted
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 9 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
145
Voted
ICS
2009
Tsinghua U.
15 years 9 months ago
High-performance regular expression scanning on the Cell/B.E. processor
Matching regular expressions (regexps) is a very common workload. For example, tokenization, which consists of recognizing words or keywords in a character stream, appears in ever...
Daniele Paolo Scarpazza, Gregory F. Russell
« Prev « First page 3396 / 3662 Last » Next »