Sciweavers

648 search results - page 42 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
LREC
2010
150views Education» more  LREC 2010»
13 years 9 months ago
Detection of Peculiar Examples using LOF and One Class SVM
This paper proposes the method to detect peculiar examples of the target word from a corpus. The peculiar example is regarded as an outlier in the given example set. Therefore we ...
Hiroyuki Shinnou, Minoru Sasaki
TPDS
2010
174views more  TPDS 2010»
13 years 6 months ago
Parallel Two-Sided Matrix Reduction to Band Bidiagonal Form on Multicore Architectures
The objective of this paper is to extend, in the context of multicore architectures, the concepts of tile algorithms [Buttari et al., 2007] for Cholesky, LU, QR factorizations to t...
Hatem Ltaief, Jakub Kurzak, Jack Dongarra
ETRA
2010
ACM
167views Biometrics» more  ETRA 2010»
14 years 2 months ago
Understanding the benefits of gaze enhanced visual search
In certain applications such as radiology and imagery analysis, it is important to minimize errors. In this paper we evaluate a structured inspection method that uses eye tracking...
Pernilla Qvarfordt, Jacob T. Biehl, Gene Golovchin...
WWW
2004
ACM
14 years 8 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
GLVLSI
2003
IEEE
171views VLSI» more  GLVLSI 2003»
14 years 28 days ago
Combining wire swapping and spacing for low-power deep-submicron buses
We propose an approach for reducing the energy consumption of address buses that targets both the switching and the crosstalk components of power dissipation. The method is based ...
Enrico Macii, Massimo Poncino, Sabino Salerno