Sciweavers

4541 search results - page 853 / 909
» Cache-Oblivious Algorithms and Data Structures
Sort
View
176
Voted
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 9 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
15 years 9 months ago
Smoother Based 3-D Attitude Estimation for Mobile Robot Localization
The mobile robot localization problem is decomposed into two stages attitude estimation followed by position estimation. The innovation of our method is the use of a smoother, in ...
Stergios I. Roumeliotis, Gaurav S. Sukhatme, Georg...
147
Voted
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 9 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
AAAI
2008
15 years 7 months ago
An Effective and Robust Method for Short Text Classification
Classification of texts potentially containing a complex and specific terminology requires the use of learning methods that do not rely on extensive feature engineering. In this w...
Victoria Bobicev, Marina Sokolova
131
Voted
ECIR
2008
Springer
15 years 6 months ago
A Comparison of Social Bookmarking with Traditional Search
Abstract. Social bookmarking systems allow users to store links to internet resources on a web page. As social bookmarking systems are growing in popularity, search algorithms have...
Beate Krause, Andreas Hotho, Gerd Stumme