Sciweavers

518 search results - page 81 / 104
» Data Mining Techniques on the Evaluation of Wireless Churn
Sort
View
ISPASS
2007
IEEE
15 years 8 months ago
Simplifying Active Memory Clusters by Leveraging Directory Protocol Threads
Address re-mapping techniques in so-called active memory systems have been shown to dramatically increase the performance of applications with poor cache and/or communication beha...
Dhiraj D. Kalamkar, Mainak Chaudhuri, Mark Heinric...
118
Voted
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 6 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
116
Voted
PKDD
1999
Springer
106views Data Mining» more  PKDD 1999»
15 years 6 months ago
Heuristic Measures of Interestingness
When mining a large database, the number of patterns discovered can easily exceed the capabilities of a human user to identify interesting results. To address this problem, variou...
Robert J. Hilderman, Howard J. Hamilton
CIKM
2009
Springer
15 years 8 months ago
Completing wikipedia's hyperlink structure through dimensionality reduction
Wikipedia is the largest monolithic repository of human knowledge. In addition to its sheer size, it represents a new encyclopedic paradigm by interconnecting articles through hyp...
Robert West, Doina Precup, Joelle Pineau
117
Voted
ISESE
2006
IEEE
15 years 7 months ago
Using observational pilot studies to test and improve lab packages
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
Manoel G. Mendonça, Daniela Cruzes, Josemei...