Sciweavers

8468 search results - page 1310 / 1694
» The Technology of Data Stashing
Sort
View
ICDE
2008
IEEE
127views Database» more  ICDE 2008»
16 years 1 months ago
Optimizing SQL Queries over Text Databases
Text documents often embed data that is structured in nature, and we can expose this structured data using information extraction technology. By processing a text database with inf...
Alpa Jain, AnHai Doan, Luis Gravano
MICCAI
2007
Springer
16 years 19 days ago
Outlier Rejection for Diffusion Weighted Imaging
Abstract. This paper introduces an outlier rejection and signal reconstruction method for high angular resolution diffusion weighted imaging. The approach is based on the threshold...
Carl-Fredrik Westin, Marc Niethammer, Martha Eliza...
RECOMB
2009
Springer
16 years 9 days ago
Storage and Retrieval of Individual Genomes
A repetitive sequence collection is one where portions of a base sequence of length n are repeated many times with small variations, forming a collection of total length N. Example...
Gonzalo Navarro, Jouni Sirén, Niko Väl...
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 7 days ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
HPCA
2008
IEEE
16 years 2 days ago
EXCES: External caching in energy saving storage systems
Power consumption within the disk-based storage subsystem forms a substantial portion of the overall energy footprint in commodity systems. Researchers have proposed external cach...
Luis Useche, Jorge Guerra, Medha Bhadkamkar, Mauri...
« Prev « First page 1310 / 1694 Last » Next »