Sciweavers

2721 search results - page 130 / 545
» An experimental analysis of Lemke-Howson algorithm
Sort
View
COMPUTING
2008
174views more  COMPUTING 2008»
14 years 10 months ago
Multilevel algorithms for Rannacher-Turek finite element approximation of 3D elliptic problems
Generalizing the approach of a previous work [15] the authors present multilevel preconditioners for three-dimensional (3D) elliptic problems discretized by a family of Rannacher ...
Ivan Georgiev, Johannes Kraus, Svetozar Margenov
SIGIR
2002
ACM
14 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 4 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
MM
2003
ACM
110views Multimedia» more  MM 2003»
15 years 3 months ago
Music thumbnailing via structural analysis
Music thumbnailing (or music summarization) aims at finding the most representative part of a song, which can be used for web browsing, web searching and music recommendation. Thr...
Wei Chai, Barry Vercoe
TOPLAS
2002
89views more  TOPLAS 2002»
14 years 9 months ago
Efficient and precise array access analysis
A number of existing compiler techniques hinge on the analysis of array accesses in the program. The most important task in array access analysis is to collect the information abo...
Yunheung Paek, Jay Hoeflinger, David A. Padua