Sciweavers

13841 search results - page 2475 / 2769
» Algorithms and Constraint Programming
Sort
View
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
15 years 11 months ago
Mining Graph Evolution Rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern that describe the evolution of large networks over time, at a local level. Given a sequenc...
Michele Berlingerio, Francesco Bonchi, Björn ...
PRIB
2009
Springer
120views Bioinformatics» more  PRIB 2009»
15 years 11 months ago
Knowledge-Guided Docking of WW Domain Proteins and Flexible Ligands
Studies of interactions between protein domains and ligands are important in many aspects such as cellular signaling. We present a knowledge-guided approach for docking protein dom...
Haiyun Lu, Hao Li, Shamima Banu Bte Sm Rashid, Wee...
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 11 months ago
Reducing metadata complexity for faster table summarization
Since the visualization real estate puts stringent constraints on how much data can be presented to the users at once, table summarization is an essential tool in helping users qu...
K. Selçuk Candan, Mario Cataldi, Maria Luis...
CODES
2008
IEEE
15 years 11 months ago
Scratchpad allocation for concurrent embedded software
Software-controlled scratchpad memory is increasingly employed in embedded systems as it offers better timing predictability compared to caches. Previous scratchpad allocation alg...
Vivy Suhendra, Abhik Roychoudhury, Tulika Mitra
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
15 years 10 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
« Prev « First page 2475 / 2769 Last » Next »