Sciweavers

1242 search results - page 244 / 249
» Digital Objects as Passwords
Sort
View
WCET
2010
14 years 7 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
DOLAP
2010
ACM
14 years 7 months ago
Integrating OLAP and recommender systems: an evaluation perspective
The integration of OLAP with web-search technologies is a promising research topic. Recommender systems are popular web-search mechanisms, because they can address information ove...
Artus Krohn-Grimberghe, Alexandros Nanopoulos, Lar...
IJON
2010
121views more  IJON 2010»
14 years 6 months ago
Sample-dependent graph construction with application to dimensionality reduction
Graph construction plays a key role on learning algorithms based on graph Laplacian. However, the traditional graph construction approaches of -neighborhood and k-nearest-neighbor...
Bo Yang, Songcan Chen
INFSOF
2010
107views more  INFSOF 2010»
14 years 6 months ago
A systematic review on strategic release planning models
Context. Strategic release planning (sometimes referred to as road-mapping) is an important phase of the requirements engineering process performed at product level. It is concern...
Mikael Svahnberg, Tony Gorschek, Robert Feldt, Ric...
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 4 months ago
Deep Self-Taught Learning for Handwritten Character Recognition
Recent theoretical and empirical work in statistical machine learning has demonstrated the importance of learning algorithms for deep architectures, i.e., function classes obtaine...
Frédéric Bastien, Yoshua Bengio, Arn...