Sciweavers

1039 search results - page 114 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
JMM2
2008
107views more  JMM2 2008»
15 years 1 months ago
Finding Interesting Images in Albums using Attention
Commercial systems such as Flickr display interesting photos from their collection as an interaction mechanism for sampling the collection. It purely relies on social activity anal...
Karthikeyan Vaiapury, Mohan S. Kankanhalli
CCR
2004
151views more  CCR 2004»
15 years 1 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
ICASSP
2009
IEEE
14 years 11 months ago
Probabilistic matrix tri-factorization
Nonnegative matrix tri-factorization (NMTF) is a 3-factor decomposition of a nonnegative data matrix, X USV , where factor matrices, U, S, and V , are restricted to be nonnegativ...
Jiho Yoo, Seungjin Choi
TSP
2012
13 years 9 months ago
Parametrization of Linear Systems Using Diffusion Kernels
—Modeling natural and artificial systems has played a key role in various applications and has long been a task that has drawn enormous efforts. In this work, instead of explori...
Ronen Talmon, Dan Kushnir, Ronald R. Coifman, Isra...
ICSE
2000
IEEE-ACM
15 years 5 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley