Sciweavers

2421 search results - page 219 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ISPASS
2007
IEEE
15 years 10 months ago
CA-RAM: A High-Performance Memory Substrate for Search-Intensive Applications
This paper proposes a specialized memory structure called CA-RAM (Content Addressable Random Access Memory) to accelerate search operations present in many important real-world ap...
Sangyeun Cho, Joel R. Martin, Ruibin Xu, Mohammad ...
151
Voted
BPM
2007
Springer
130views Business» more  BPM 2007»
15 years 10 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...
136
Voted
CIKM
2005
Springer
15 years 9 months ago
Adaptive load shedding for windowed stream joins
We present an adaptive load shedding approach for windowed stream joins. In contrast to the conventional approach of dropping tuples from the input streams, we explore the concept...
Bugra Gedik, Kun-Lung Wu, Philip S. Yu, Ling Liu
157
Voted
ML
2002
ACM
163views Machine Learning» more  ML 2002»
15 years 3 months ago
Structural Modelling with Sparse Kernels
A widely acknowledged drawback of many statistical modelling techniques, commonly used in machine learning, is that the resulting model is extremely difficult to interpret. A numb...
Steve R. Gunn, Jaz S. Kandola
134
Voted
FGR
2008
IEEE
153views Biometrics» more  FGR 2008»
15 years 10 months ago
Facial image analysis using local feature adaptation prior to learning
Many facial image analysis methods rely on learningbased techniques such as Adaboost or SVMs to project classifiers based on the selection of local image filters (e.g., Haar and...
Rogerio Feris, Ying-li Tian, Yun Zhai, Arun Hampap...