Sciweavers

3750 search results - page 457 / 750
» Timed Automata Patterns
Sort
View
143
Voted
USENIX
2007
15 years 6 months ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
ESANN
2007
15 years 5 months ago
Structured reservoir computing with spatiotemporal chaotic attractors
Abstract. We approach the themes “computing with chaos” and “reservoir computing” in a unified setting. Different neural architectures are mentioned which display chaotic...
Carlos Lourenço
DMIN
2006
131views Data Mining» more  DMIN 2006»
15 years 5 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
BMCBI
2007
104views more  BMCBI 2007»
15 years 3 months ago
Joint mapping of genes and conditions via multidimensional unfolding analysis
Background: Microarray compendia profile the expression of genes in a number of experimental conditions. Such data compendia are useful not only to group genes and conditions base...
Katrijn Van Deun, Kathleen Marchal, Willem J. Heis...
PR
2008
228views more  PR 2008»
15 years 3 months ago
Accurate integration of multi-view range images using k-means clustering
3D modelling finds a wide range of applications in industry. However, due to the presence of surface scanning noise, accumulative registration errors, and improper data fusion, re...
Hong Zhou, Yonghuai Liu