Sciweavers

2953 search results - page 244 / 591
» A Feature Selection Technique based on Distributional Differ...
Sort
View
NOMS
2008
IEEE
14 years 2 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
PKDD
2010
Springer
127views Data Mining» more  PKDD 2010»
13 years 6 months ago
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs
Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise dif...
Frank Eichinger, Klaus Krogmann, Roland Klug, Klem...
IPPS
1998
IEEE
14 years 18 days ago
A Generalized Framework for Global Communication Optimization
In distributed-memory message-passing architectures reducing communication cost is extremely important. In this paper, we present a technique to optimize communication globally. O...
Mahmut T. Kandemir, Prithviraj Banerjee, Alok N. C...
JMLR
2006
107views more  JMLR 2006»
13 years 8 months ago
Consistency of Multiclass Empirical Risk Minimization Methods Based on Convex Loss
The consistency of classification algorithm plays a central role in statistical learning theory. A consistent algorithm guarantees us that taking more samples essentially suffices...
Di-Rong Chen, Tao Sun
ISQED
2007
IEEE
127views Hardware» more  ISQED 2007»
14 years 2 months ago
Sensitivity Based Link Insertion for Variation Tolerant Clock Network Synthesis
Clock distribution is one of the key limiting factors in any high speed, sub-100nm VLSI design. Unwanted clock skews, caused by variation effects like manufacturing variations, po...
Joon-Sung Yang, Anand Rajaram, Ninghy Shi, Jian Ch...