Sciweavers

1056 search results - page 138 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
117
Voted
AAAI
2007
15 years 4 months ago
Conservative Dual Consistency
Consistencies are properties of Constraint Networks (CNs) that can be exploited in order to make inferences. When a significant amount of such inferences can be performed, CNs ar...
Christophe Lecoutre, Stéphane Cardon, Julie...
NSDI
2008
15 years 4 months ago
Harnessing Exposed Terminals in Wireless Networks
This paper presents the design, implementation, and experimental evaluation of CMAP (Conflict Maps), a system that increases the number of successful concurrent transmissions in a...
Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan
WSC
2007
15 years 4 months ago
Agile optimization for coercion
Coercion combines flexible points, semi-automated optimization and expert guided manual code modification for adapting simulations to meet new requirements. Coercion can improve s...
Lingjia Tang, Paul F. Reynolds Jr.
138
Voted
ADMA
2008
Springer
124views Data Mining» more  ADMA 2008»
15 years 3 months ago
Dimensionality Reduction for Classification
We investigate the effects of dimensionality reduction using different techniques and different dimensions on six two-class data sets with numerical attributes as pre-processing fo...
Frank Plastria, Steven De Bruyne, Emilio Carrizosa
APWEB
2008
Springer
15 years 3 months ago
Mining, Ranking, and Using Acronym Patterns
Techniques for being able to automatically identify acronym patterns are very important for enhancing a multitude of applications that rely upon search. This task is challenging, d...
Xiaonan Ji, Gu Xu, James Bailey, Hang Li