Sciweavers

1766 search results - page 195 / 354
» Classifier Selection Based on Data Complexity Measures
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
15 years 10 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
125
Voted
TREC
2003
15 years 4 months ago
Report on the TREC 2003 Experiment: Genomic Track
After retrieval, this simple strategy yield to an important improvement of the average precision: from 17.02 up to 35.80. Task II. Our approach is based on argumentative structurin...
Patrick Ruch, Gilles Cohen, Frédéric...
119
Voted
IPPS
1996
IEEE
15 years 7 months ago
Implementing the Data Diffusion Machine Using Crossbar Routers
The Data Diffusion Machine is a scalable virtual shared memory architecture. A hierarchical network is used to ensure that all data can be located in a time bounded by O(logp), wh...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
146
Voted
AHSWN
2006
206views more  AHSWN 2006»
15 years 3 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
129
Voted
ACMMSP
2004
ACM
101views Hardware» more  ACMMSP 2004»
15 years 9 months ago
Metrics and models for reordering transformations
Irregular applications frequently exhibit poor performance on contemporary computer architectures, in large part because of their inefficient use of the memory hierarchy. Runtime ...
Michelle Mills Strout, Paul D. Hovland