Sciweavers

287 search results - page 54 / 58
» Classification of Six-Point Metrics
Sort
View
BMCBI
2008
166views more  BMCBI 2008»
14 years 10 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
ASPLOS
2008
ACM
14 years 11 months ago
Hardware counter driven on-the-fly request signatures
Today's processors provide a rich source of statistical information on application execution through hardware counters. In this paper, we explore the utilization of these sta...
Kai Shen, Ming Zhong, Sandhya Dwarkadas, Chuanpeng...
CVPR
2000
IEEE
15 years 12 months ago
Discriminant-EM Algorithm with Application to Image Retrieval
In Proc. of IEEE Conf. on CVPR'2000, Vol.I, pp.222-227, Hilton Head Island, SC, 2000 In many vision applications, the practice of supervised learning faces several difficulti...
Ying Wu, Qi Tian, Thomas S. Huang
WWW
2009
ACM
15 years 10 months ago
Measuring the similarity between implicit semantic relations from the web
Measuring the similarity between semantic relations that hold among entities is an important and necessary step in various Web related tasks such as relation extraction, informati...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
WWW
2004
ACM
15 years 10 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang