Sciweavers

1240 search results - page 135 / 248
» Applying Memetic Algorithms to the Analysis of Microarray Da...
Sort
View
IIWAS
2008
15 years 4 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 3 months ago
Tensor-CUR decompositions for tensor-based data
Motivated by numerous applications in which the data may be modeled by a variable subscripted by three or more indices, we develop a tensor-based extension of the matrix CUR decom...
Michael W. Mahoney, Mauro Maggioni, Petros Drineas
DAGSTUHL
1996
15 years 4 months ago
Specialization of Imperative Programs Through Analysis of Relational Expressions
An analysis method for specialization of imperative programs is described in this paper. This analysis is an inter-procedural data flow method operating on control flow graphs and...
Alexander Sakharov
125
Voted
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 3 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
GLOBECOM
2008
IEEE
15 years 9 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar