Sciweavers

50 search results - page 6 / 10
» A generalized control-flow-aware pattern recognition algorit...
Sort
View
CIKM
2011
Springer
12 years 7 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
IBPRIA
2007
Springer
14 years 1 months ago
Blind Estimation of Motion Blur Parameters for Image Deconvolution
Abstract. This paper describes an approach to estimate the parameters of a motion blur (direction and length) directly form the observed image. The motion blur estimate can then be...
João P. Oliveira, Mário A. T. Figuei...
CCS
2009
ACM
14 years 8 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
11 years 9 months ago
Learning from crowds in the presence of schools of thought
Crowdsourcing has recently become popular among machine learning researchers and social scientists as an effective way to collect large-scale experimental data from distributed w...
Yuandong Tian, Jun Zhu
PLDI
2003
ACM
14 years 18 days ago
Predicting whole-program locality through reuse distance analysis
Profiling can accurately analyze program behavior for select data inputs. We show that profiling can also predict program locality for inputs other than profiled ones. Here loc...
Chen Ding, Yutao Zhong