Sciweavers

1176 search results - page 200 / 236
» Implicit Abstraction Heuristics
Sort
View
AAECC
2007
Springer
111views Algorithms» more  AAECC 2007»
15 years 18 days ago
When cache blocking of sparse matrix vector multiply works and why
Abstract. We present new performance models and a new, more compact data structure for cache blocking when applied to the sparse matrixvector multiply (SpM×V) operation, y ← y +...
Rajesh Nishtala, Richard W. Vuduc, James Demmel, K...
103
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 16 days ago
Interference Alignment as a Rank Constrained Rank Minimization
Abstract--We show that the maximization of the sum degreesof-freedom for the static flat-fading multiple-input multipleoutput (MIMO) interference channel is equivalent to a rank co...
Dimitris S. Papailiopoulos, Alexandros G. Dimakis
ACTA
2006
104views more  ACTA 2006»
15 years 16 days ago
Safe projections of binary data sets
Abstract Selectivity estimation of a boolean query based on frequent itemsets can be solved by describing the problem by a linear program. However, the number of variables in the e...
Nikolaj Tatti
90
Voted
CORR
2006
Springer
111views Education» more  CORR 2006»
15 years 14 days ago
Raisonner avec des diagrammes : perspectives cognitives et computationnelles
ABSTRACT. Reasoning with diagrams: cognitive and computational perspectives. Diagrammatic, analogical or iconic representations are often contrasted with linguistic or logical repr...
Catherine Recanati
102
Voted
JASIS
2008
76views more  JASIS 2008»
15 years 13 days ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza