Sciweavers

26354 search results - page 5160 / 5271
» How we refactor, and how we know it
Sort
View
JMLR
2010
116views more  JMLR 2010»
14 years 8 months ago
Feature Selection, Association Rules Network and Theory Building
As the size and dimensionality of data sets increase, the task of feature selection has become increasingly important. In this paper we demonstrate how association rules can be us...
Sanjay Chawla
JOCN
2010
84views more  JOCN 2010»
14 years 8 months ago
The Neural Basis for Spatial Relations
Studies in semantics traditionally focus on knowledge of objects. By contrast, less is known about how objects relate to each other. In an fMRI study, we tested the hypothesis tha...
Prin X. Amorapanth, Page Widick, Anjan Chatterjee
PE
2010
Springer
175views Optimization» more  PE 2010»
14 years 8 months ago
Generalized ERSS tree model: Revisiting working sets
Accurately characterizing the resource usage of an application at various levels in the memory hierarchy has been a long-standing research problem. Existing characterization studi...
Ricardo Koller, Akshat Verma, Raju Rangaswami
TASE
2010
IEEE
14 years 8 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
134
Voted
TIFS
2010
130views more  TIFS 2010»
14 years 8 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
« Prev « First page 5160 / 5271 Last » Next »