Sciweavers

956 search results - page 107 / 192
» Source Constrained Clustering
Sort
View
107
Voted
IPPS
2007
IEEE
15 years 10 months ago
Implementing and Evaluating Automatic Checkpointing
As the size and popularity of computer clusters go on growing, fault tolerance is becoming a crucial factor to ensure high performance and reliability for applications. To provide...
Antonio S. Martins, Ronaldo Augusto Lara Gon&ccedi...
130
Voted
WCRE
2007
IEEE
15 years 10 months ago
Lossless Comparison of Nested Software Decompositions
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Mark Shtern, Vassilios Tzerpos
160
Voted
EPIA
2005
Springer
15 years 9 months ago
User Group Profile Modeling Based on User Transactional Data for Personalized Systems
In this paper, we propose a framework named UMT (User-profile Modeling based on Transactional data) for modeling user group profiles based on the transactional data. UMT is a gener...
Yiling Yang, Nuno C. Marques
IEAAIE
2005
Springer
15 years 9 months ago
A SOM Based Approach for Visualization of GSM Network Performance Data
In this paper, a neural network based approach to visualize performance data of a GSM network is presented. The proposed approach consists of several steps. First, a suitable propo...
Pasi Lehtimäki, Kimmo Raivio
NAACL
2003
15 years 5 months ago
Columbia's Newsblaster: New Features and Future Directions
Columbia’s Newsblaster tracking and summarization system is a robust system that clusters news into events, categorizes events into broad topics and summarizes multiple articles...
Kathleen McKeown, Regina Barzilay, John Chen, Davi...