Sciweavers

2032 search results - page 396 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
ICPP
1999
IEEE
15 years 1 months ago
Improving Performance of Load-Store Sequences for Transaction Processing Workloads on Multiprocessors
On-line transaction processing exhibits poor memory behavior in high-end multiprocessor servers because of complex sharing patterns and substantial interaction between the databas...
Jim Nilsson, Fredrik Dahlgren
92
Voted
ECCV
2010
Springer
15 years 23 hour ago
An Oriented Flux Symmetry Based Active Contour Model for Three Dimensional Vessel Segmentation
This paper proposes a novel approach to segment three dimensional curvilinear structures, particularly vessels in angiography, by inspecting the symmetry of image gradients. The pr...
BMCBI
2002
110views more  BMCBI 2002»
14 years 9 months ago
Identifying functional relationships among human genes by systematic analysis of biological literature
Background: The availability of biomedical literature in electronic format has made it possible to implement automatic text processing methods to expose implicit relationships amo...
Yong-Chuan Tao, Rudolph L. Leibel
VLSID
2002
IEEE
142views VLSI» more  VLSID 2002»
15 years 10 months ago
Address Code and Arithmetic Optimizations for Embedded Systems
An important class of problems used widely in both the embedded systems and scientific domains perform memory intensive computations on large data sets. These data sets get to be ...
J. Ramanujam, Satish Krishnamurthy, Jinpyo Hong, M...
88
Voted
CIKM
2008
Springer
14 years 11 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher