Sciweavers

1766 search results - page 195 / 354
» Classifier Selection Based on Data Complexity Measures
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 8 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
TREC
2003
15 years 3 months ago
Report on the TREC 2003 Experiment: Genomic Track
After retrieval, this simple strategy yield to an important improvement of the average precision: from 17.02 up to 35.80. Task II. Our approach is based on argumentative structurin...
Patrick Ruch, Gilles Cohen, Frédéric...
IPPS
1996
IEEE
15 years 5 months ago
Implementing the Data Diffusion Machine Using Crossbar Routers
The Data Diffusion Machine is a scalable virtual shared memory architecture. A hierarchical network is used to ensure that all data can be located in a time bounded by O(logp), wh...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
129
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 1 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ACMMSP
2004
ACM
101views Hardware» more  ACMMSP 2004»
15 years 7 months ago
Metrics and models for reordering transformations
Irregular applications frequently exhibit poor performance on contemporary computer architectures, in large part because of their inefficient use of the memory hierarchy. Runtime ...
Michelle Mills Strout, Paul D. Hovland