Sciweavers

1167 search results - page 169 / 234
» Limits of Spectral Clustering
Sort
View
PDCAT
2009
Springer
15 years 7 months ago
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Abstract—Awerbuch and Scheideler have shown that peerto-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topo...
Emmanuelle Anceaume, Francisco V. Brasileiro, Roma...
ICASSP
2008
IEEE
15 years 7 months ago
Topic mining on web-shared videos
Internet videos have grown exponentially with the help from video sharing websites. Automatic topic mining is therefore increasingly important for organizing and navigating such l...
Lu Liu, Yong Rui, Lifeng Sun, Bo Yang, Jianwei Zha...
105
Voted
ICPP
2007
IEEE
15 years 7 months ago
Tempest: A portable tool to identify hot spots in parallel code
Compute clusters are consuming more power at higher densities than ever before. This results in increased thermal dissipation, the need for powerful cooling systems, and ultimatel...
Kirk W. Cameron, Hari K. Pyla, Srinidhi Varadaraja...
HIPC
2007
Springer
15 years 6 months ago
A Scalable Asynchronous Replication-Based Strategy for Fault Tolerant MPI Applications
As computational clusters increase in size, their mean-time-to-failure reduces. Typically checkpointing is used to minimize the loss of computation. Most checkpointing techniques, ...
John Paul Walters, Vipin Chaudhary
125
Voted
PAKDD
2007
ACM
115views Data Mining» more  PAKDD 2007»
15 years 6 months ago
Intelligent Sequential Mining Via Alignment: Optimization Techniques for Very Large DB
The shear volume of the results in traditional support based frequent sequential pattern mining methods has led to increasing interest in new intelligent mining methods to find mo...
Hye-Chung Kum, Joong Hyuk Chang, Wei Wang 0010