Sciweavers

963 search results - page 123 / 193
» Escape Analysis on Lists
Sort
View
156
Voted
CLEF
2009
Springer
14 years 10 months ago
Medical Image Retrieval: ISSR at CLEF 2009
This paper represents the first participation of the Institute of Statistical Studies and Research at Cairo University group in CLEF 2009-Medical image retrieval track. Our system...
Waleed Arafa, Ragia Ibrahim
DMIN
2009
144views Data Mining» more  DMIN 2009»
14 years 10 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
138
Voted
FECS
2009
172views Education» more  FECS 2009»
14 years 10 months ago
Using Interface Inheritance to Structure the Data Structures Course
Traditional instruction in the first data structures course treats object-oriented inheritance and polymorphism as isolated topics if at all. Course organization is an exploration...
Dale Parson, Daniel Spiegel
113
Voted
HCI
2009
14 years 10 months ago
A Multiple-Aspects Visualization Tool for Exploring Social Networks
Social network analysis (SNA) has been used to study the relationships between actors in social networks, revealing their features and patterns. In most cases, nodes and edges in g...
Jie Gao, Kazuo Misue, Jiro Tanaka
HIPC
2009
Springer
14 years 10 months ago
A performance prediction model for the CUDA GPGPU platform
The significant growth in computational power of modern Graphics Processing Units(GPUs) coupled with the advent of general purpose programming environments like NVIDA's CUDA,...
Kishore Kothapalli, Rishabh Mukherjee, M. Suhail R...