Sciweavers

4636 search results - page 847 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
75
Voted
ASPLOS
1991
ACM
15 years 1 months ago
NUMA Policies and Their Relation to Memory Architecture
Multiprocessor memory reference traces provide a wealth of information on the behavior of parallel programs. We have used this information to explore the relationship between kern...
William J. Bolosky, Michael L. Scott, Robert P. Fi...
CIKM
2008
Springer
15 years 4 days ago
Summarization of social activity over time: people, actions and concepts in dynamic networks
We present a framework for automatically summarizing social group activity over time. The problem is important in understanding large scale online social networks, which have dive...
Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
114
Voted
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
15 years 4 days ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
AICCSA
2005
IEEE
129views Hardware» more  AICCSA 2005»
15 years 4 days ago
Enhanced visual evaluation of feature extractors for image mining
Plus BROWSE SEARCH IEEE XPLORE GUIDE SUPPORT View TOC Enhanced visual evaluation of feature extractors for image mining Rodrigues, J.F., Jr. Traina, A.J.M. Traina, C., Jr. Comput. ...
José Fernando Rodrigues Jr., Agma J. M. Tra...
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
14 years 11 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...