Sciweavers

1344 search results - page 191 / 269
» Automatic performance analysis with periscope
Sort
View
ICDM
2006
IEEE
154views Data Mining» more  ICDM 2006»
15 years 5 months ago
Mining and Predicting Duplication over Peer-to-Peer Query Streams
Many previous works of data mining user queries in Peer-to-Peer systems focused their attention on the distribution of query contents. However, few has been done towards a better ...
Shicong Meng, Yifeng Shao, Cong Shi, Dingyi Han, Y...
85
Voted
ISPASS
2006
IEEE
15 years 5 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
ICIP
2005
IEEE
15 years 5 months ago
HMM-based motion recognition system using segmented PCA
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Hidden Markov Models (HMM). We build our models on Principal Com...
Faisal I. Bashir, Wei Qu, Ashfaq A. Khokhar, Dan S...
88
Voted
ANCS
2005
ACM
15 years 5 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
95
Voted
ICFP
2005
ACM
15 years 5 months ago
Fast narrowing-driven partial evaluation for inductively sequential programs
Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good resu...
J. Guadalupe Ramos, Josep Silva, Germán Vid...