Sciweavers

1589 search results - page 210 / 318
» Constraints with Variables' Annotations
Sort
View
KDD
2003
ACM
124views Data Mining» more  KDD 2003»
14 years 10 months ago
Information-theoretic co-clustering
Two-dimensional contingency or co-occurrence tables arise frequently in important applications such as text, web-log and market-basket data analysis. A basic problem in contingenc...
Inderjit S. Dhillon, Subramanyam Mallela, Dharmend...
ICCAD
2002
IEEE
109views Hardware» more  ICCAD 2002»
14 years 7 months ago
Methods for true power minimization
This paper presents methods for efficient power minimization at circuit and micro-architectural levels. The potential energy savings are strongly related to the energy profile of ...
Robert W. Brodersen, Mark Horowitz, Dejan Markovic...
DATE
2009
IEEE
122views Hardware» more  DATE 2009»
14 years 4 months ago
A MILP-based approach to path sensitization of embedded software
—We propose a new methodology based on Mixed Integer Linear Programming (MILP) for determining the input values that will exercise a specified execution path in a program. In or...
José C. Costa, José C. Monteiro
CCGRID
2008
IEEE
14 years 4 months ago
A Stochastic Programming Approach for QoS-Aware Service Composition
—We formulate the service composition problem as a multi-objective stochastic program which simultaneously optimizes the following quality of service (QoS) parameters: workflow ...
Wolfram Wiesemann, Ronald Hochreiter, Daniel Kuhn
ICASSP
2008
IEEE
14 years 4 months ago
Sparse and shift-invariant feature extraction from non-negative data
In this paper we describe a technique that allows the extraction of multiple local shift-invariant features from analysis of non-negative data of arbitrary dimensionality. Our app...
Paris Smaragdis, Bhiksha Raj, Madhusudana V. S. Sh...