Sciweavers

1906 search results - page 326 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
ICDM
2009
IEEE
259views Data Mining» more  ICDM 2009»
15 years 2 months ago
Topic Modeling for Sequences of Temporal Activities
: Topic Modeling for Sequences of Temporal Activities Zhi-Yong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-Dong Shen HP Laboratories HPL-2010-160 topic modeling, LDA, sequence, temp...
Zhiyong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-...
CPHYSICS
2007
222views more  CPHYSICS 2007»
15 years 4 months ago
JADAMILU: a software code for computing selected eigenvalues of large sparse symmetric matrices
A new software code for computing selected eigenvalues and associated eigenvectors of a real symmetric matrix is described. The eigenvalues are either the smallest or those closes...
Matthias Bollhöfer, Yvan Notay
127
Voted
GREC
2009
Springer
15 years 8 months ago
A Performance Characterization Algorithm for Symbol Localization
In this paper we present an algorithm for performance characterization of symbol localization systems. This algorithm is aimed to be a more “reliable” and “open” solution t...
Mathieu Delalandre, Jean-Yves Ramel, Ernest Valven...
PTS
2007
144views Hardware» more  PTS 2007»
15 years 6 months ago
Component Testing Is Not Enough - A Study of Software Faults in Telecom Middleware
The interrelationship between software faults and failures is quite intricate and obtaining a meaningful characterization of it would definitely help the testing community in decid...
Sigrid Eldh, Sasikumar Punnekkat, Hans Hansson, Pe...
DCOSS
2007
Springer
15 years 8 months ago
Energy Efficient Intrusion Detection in Camera Sensor Networks
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor ...
Primoz Skraba, Leonidas J. Guibas