Sciweavers

459 search results - page 80 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
IJPP
2011
115views more  IJPP 2011»
12 years 11 months ago
Milepost GCC: Machine Learning Enabled Self-tuning Compiler
Tuning compiler optimizations for rapidly evolving hardware makes porting and extending an optimizing compiler for each new platform extremely challenging. Iterative optimization i...
Grigori Fursin, Yuriy Kashnikov, Abdul Wahid Memon...
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 2 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
BROADNETS
2005
IEEE
14 years 1 months ago
Multi-rate throughput optimization for wireless local area network anomaly problem
— Due to varying wireless channel conditions, the IEEE 802.11 wireless local area network (WLAN) standard supports multiple modulation types to accommodate the tradeoff between d...
Yu-Liang Kuo, Kun-Wei Lai, Frank Yeong-Sung Lin, Y...
BMCBI
2007
118views more  BMCBI 2007»
13 years 7 months ago
A topological algorithm for identification of structural domains of proteins
Background: Identification of the structural domains of proteins is important for our understanding of the organizational principles and mechanisms of protein folding, and for ins...
Frank Emmert-Streib, Arcady R. Mushegian
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 8 months ago
Effective multi-label active learning for text classification
Labeling text data is quite time-consuming but essential for automatic text classification. Especially, manually creating multiple labels for each document may become impractical ...
Bishan Yang, Jian-Tao Sun, Tengjiao Wang, Zheng Ch...