Sciweavers

956 search results - page 107 / 192
» Source Constrained Clustering
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Implementing and Evaluating Automatic Checkpointing
As the size and popularity of computer clusters go on growing, fault tolerance is becoming a crucial factor to ensure high performance and reliability for applications. To provide...
Antonio S. Martins, Ronaldo Augusto Lara Gon&ccedi...
WCRE
2007
IEEE
15 years 4 months ago
Lossless Comparison of Nested Software Decompositions
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Mark Shtern, Vassilios Tzerpos
EPIA
2005
Springer
15 years 3 months ago
User Group Profile Modeling Based on User Transactional Data for Personalized Systems
In this paper, we propose a framework named UMT (User-profile Modeling based on Transactional data) for modeling user group profiles based on the transactional data. UMT is a gener...
Yiling Yang, Nuno C. Marques
IEAAIE
2005
Springer
15 years 3 months ago
A SOM Based Approach for Visualization of GSM Network Performance Data
In this paper, a neural network based approach to visualize performance data of a GSM network is presented. The proposed approach consists of several steps. First, a suitable propo...
Pasi Lehtimäki, Kimmo Raivio
NAACL
2003
14 years 11 months ago
Columbia's Newsblaster: New Features and Future Directions
Columbia’s Newsblaster tracking and summarization system is a robust system that clusters news into events, categorizes events into broad topics and summarizes multiple articles...
Kathleen McKeown, Regina Barzilay, John Chen, Davi...