Sciweavers

12257 search results - page 234 / 2452
» Analysis of Algorithms
Sort
View
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
15 years 8 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
118
Voted
STOC
1998
ACM
139views Algorithms» more  STOC 1998»
15 years 6 months ago
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs
In [6], Gallager introduces a family of codes based on sparse bipartite graphs, which he calls low-density parity-check codes. He suggests a natural decoding algorithm for these c...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
ISCAS
1994
IEEE
96views Hardware» more  ISCAS 1994»
15 years 6 months ago
Analysis and Design of Adaptive Self-Trimming Technique for A/D Converters
A novel self-trimming algorithm for A/D converters [1,2] has been presented which continually trims thresholds in the flash A/D subconverters of two-stage and pipelined A/D conver...
Zhiqiang Gu, W. Martin Snelgrove
WWW
2004
ACM
16 years 2 months ago
Link fusion: a unified link analysis framework for multi-type interrelated data objects
Web link analysis has proven to be a significant enhancement for quality based web search. Most existing links can be classified into two categories: intra-type links (e.g., web h...
Wensi Xi, Benyu Zhang, Zheng Chen, Yizhou Lu, Shui...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 7 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel