Sciweavers

2297 search results - page 416 / 460
» A fast APRIORI implementation
Sort
View
SAC
2010
ACM
15 years 11 months ago
SE-155 DBSA: a device-based software architecture for data mining
In this paper a new architecture for a variety of data mining tasks is introduced. The Device-Based Software Architecture (DBSA) is a highly portable and generic data mining softw...
Janne Kätevä, Perttu Laurinen, Taneli Ra...
ISBMS
2010
Springer
15 years 11 months ago
Physics-Based Modeling of the Pregnant Woman
High quality obstetric images have become readily available with fast magnetic resonance imaging protocols or new 3D ultrasound probes. These obstetric images provide detailed info...
Juan Pablo de la Plata Alcalde, Lazar Bibin, J&eac...
WEA
2010
Springer
284views Algorithms» more  WEA 2010»
15 years 11 months ago
Paging Multiple Users in Cellular Network: Yellow Page and Conference Call Problems
Abstract. Mobile users are roaming in a zone of cells in a cellular network system. The probabilities of each user residing in each cell are known, and all probabilities are indepe...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002
ISQED
2009
IEEE
124views Hardware» more  ISQED 2009»
15 years 11 months ago
Revisiting the linear programming framework for leakage power vs. performance optimization
— This paper revisits and extends a general linear programming(LP) formulation to exploit multiple knobs such as multi-Lgate footprint-compatible libraries and post-layout Lgateb...
Kwangok Jeong, Andrew B. Kahng, Hailong Yao
PERCOM
2009
ACM
15 years 11 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner