Sciweavers

24529 search results - page 178 / 4906
» Computing on Authenticated Data
Sort
View
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 9 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
FCCM
2000
IEEE
144views VLSI» more  FCCM 2000»
15 years 7 months ago
Automatic Synthesis of Data Storage and Control Structures for FPGA-Based Computing Engines
Mapping computations written in high-level programming languages to FPGA-based computing engines requires programmers to generate the datapath responsible for the core of the comp...
Pedro C. Diniz, Joonseok Park
CMG
2001
15 years 4 months ago
Effective Use of the KDD Process and Data Mining for Computer Performance Professionals
- The KDD (Knowledge Discovery in Databases) paradigm is a step by step process for finding interesting patterns in large amounts of data. Data mining is one step in the process. T...
Susan P. Imberman
ISBI
2007
IEEE
15 years 9 months ago
Semi-Automatic Coronary Artery Centerline Extraction in Computed Tomography Angiography Data
This paper presents a semi-automatic coronary centerline extraction algorithm for computed tomography angiography data. The method applies region growing to computed tomography an...
Coert Metz, Michiel Schaap, Alina G. van der Giess...
ALT
1998
Springer
15 years 7 months ago
Synthesizing Learners Tolerating Computable Noisy Data
An index for an r.e. class of languages (by definition) generates a sequence of grammars defining the class. An index for an indexed family of recursive languages (by definition) ...
John Case, Sanjay Jain