Sciweavers

10792 search results - page 1945 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
MICCAI
2004
Springer
14 years 11 months ago
Geometric Flows for Segmenting Vasculature in MRI: Theory and Validation
Abstract. Often in neurosurgical planning a dual spin echo acquisition is performed that yields proton density (PD) and T2-weighted images to evaluate edema near a tumor or lesion....
Maxime Descoteaux, D. Louis Collins, Kaleem Siddiq...
ICSE
2008
IEEE-ACM
14 years 11 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SIGSOFT
2007
ACM
14 years 11 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu
ICDT
2009
ACM
119views Database» more  ICDT 2009»
14 years 11 months ago
Analysis of sampling techniques for association rule mining
In this paper, we present a comprehensive theoretical analysis of the sampling technique for the association rule mining problem. Most of the previous works have concentrated only...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
WWW
2009
ACM
14 years 11 months ago
Matchbox: large scale online bayesian recommendations
We present a probabilistic model for generating personalised recommendations of items to users of a web service. The Matchbox system makes use of content information in the form o...
David H. Stern, Ralf Herbrich, Thore Graepel
« Prev « First page 1945 / 2159 Last » Next »