Sciweavers

52 search results - page 10 / 11
» Using Non-Negative Matrix Factorization for Removing Show-Th...
Sort
View
TON
2008
76views more  TON 2008»
14 years 9 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun
QRE
2010
84views more  QRE 2010»
14 years 8 months ago
Three-level and mixed-level orthogonal arrays for lean designs
Orthogonal arrays (OA’s) are widely used in design of experiments. Each OA has a specific number of rows that is fixed by the number of factors in the OA and the number of leve...
Chang-Xing Ma, Ming-Yao Ai, L. Y. Chan, T. N. Goh
ICCAD
2009
IEEE
133views Hardware» more  ICCAD 2009»
14 years 7 months ago
A parallel preconditioning strategy for efficient transistor-level circuit simulation
A parallel computing approach for large-scale SPICE-accurate circuit simulation is described that is based on a new preconditioned iterative solver. The preconditioner involves the...
Heidi Thornquist, Eric R. Keiter, Robert J. Hoekst...
SACMAT
2010
ACM
15 years 2 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
CIDM
2007
IEEE
15 years 4 months ago
Measuring the Validity of Document Relations Discovered from Frequent Itemset Mining
— The extension approach of frequent itemset mining can be applied to discover the relations among documents. Several schemes, i.e., n-gram, stemming, stopword removal and term w...
Kritsada Sriphaew, Thanaruk Theeramunkong