Sciweavers

5962 search results - page 136 / 1193
» Working with Patterns and Code
Sort
View
117
Voted
KDID
2004
149views Database» more  KDID 2004»
15 years 4 months ago
Database Transposition for Constrained (Closed) Pattern Mining
Abstract. Recently, different works proposed a new way to mine patterns in databases with pathological size. For example, experiments in genome biology usually provide databases wi...
Baptiste Jeudy, François Rioult
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 3 months ago
A novel spectral coding in a large graph database
Retrieving related graphs containing a query graph from a large graph database is a key issue in many graph-based applications, such as drug discovery and structural pattern recog...
Lei Zou, Lei Chen 0002, Jeffrey Xu Yu, Yansheng Lu
118
Voted
LCN
2008
IEEE
15 years 10 months ago
Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding
—In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimi...
Long Long, Ahmed E. Kamal
147
Voted
HPDC
2008
IEEE
15 years 3 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
TIT
1998
72views more  TIT 1998»
15 years 3 months ago
Runlength Limited Codes for Single Error-Detection and Single Error-Correction with Mixed Type Errors
Abstract—Runlength-limited (RLL) codes are used in magnetic recording. The error patterns that occur with peak detection magnetic recording systems when using a runlength-limited...
Patrick Perry, Mingche Li, Mao Chao Lin, Zhen Zhan...