Sciweavers

97 search results - page 9 / 20
» Are refactorings less error-prone than other changes
Sort
View
ISCA
2002
IEEE
102views Hardware» more  ISCA 2002»
14 years 17 days ago
Implementing Optimizations at Decode Time
The number of pipeline stages separating dynamic instruction scheduling from instruction execution has increased considerably in recent out-of-order microprocessor implementations...
Ilhyun Kim, Mikko H. Lipasti
CVPR
2006
IEEE
13 years 11 months ago
Tracking With Sobolev Active Contours
Recently proposed Sobolev active contours introduced a new paradigm for minimizing energies defined on curves by changing the traditional cost of perturbing a curve and thereby re...
Ganesh Sundaramoorthi, Jeremy D. Jackson, Anthony ...
DMIN
2007
183views Data Mining» more  DMIN 2007»
13 years 9 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
OL
2007
156views more  OL 2007»
13 years 7 months ago
A trust region SQP algorithm for mixed-integer nonlinear programming
We propose a modified sequential quadratic programming (SQP) method for solving mixed-integer nonlinear programming problems. Under the assumption that integer variables have a s...
Oliver Exler, Klaus Schittkowski
PAKDD
2007
ACM
121views Data Mining» more  PAKDD 2007»
14 years 1 months ago
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model
When companies seek for the combination of products which can constantly generate high profit, the association rule mining (ARM) or the utility mining will not achieve such task. ...
Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang