Sciweavers

780 search results - page 82 / 156
» Reasoning about sets using redescription mining
Sort
View
89
Voted
JSA
2008
116views more  JSA 2008»
15 years 20 days ago
Analyzing composability of applications on MPSoC platforms
Modern day applications require use of multi-processor systems for reasons of performance, scalability and power efficiency. As more and more applications are integrated in a sing...
Akash Kumar, Bart Mesman, Bart D. Theelen, Henk Co...
108
Voted
RTA
2005
Springer
15 years 6 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
FUIN
2007
99views more  FUIN 2007»
15 years 20 days ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
87
Voted
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
16 years 1 months ago
Empirical comparisons of various voting methods in bagging
Finding effective methods for developing an ensemble of models has been an active research area of large-scale data mining in recent years. Models learned from data are often subj...
Kelvin T. Leung, Douglas Stott Parker Jr.
107
Voted
CIKM
2006
Springer
15 years 4 months ago
A fast and robust method for web page template detection and removal
The widespread use of templates on the Web is considered harmful for two main reasons. Not only do they compromise the relevance judgment of many web IR and web mining methods suc...
Karane Vieira, Altigran Soares da Silva, Nick Pint...