Sciweavers

4536 search results - page 859 / 908
» Contention-Sensitive Data Structures and Algorithms
Sort
View
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 11 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
AAAI
2008
13 years 10 months ago
An Effective and Robust Method for Short Text Classification
Classification of texts potentially containing a complex and specific terminology requires the use of learning methods that do not rely on extensive feature engineering. In this w...
Victoria Bobicev, Marina Sokolova
ECIR
2008
Springer
13 years 9 months ago
A Comparison of Social Bookmarking with Traditional Search
Abstract. Social bookmarking systems allow users to store links to internet resources on a web page. As social bookmarking systems are growing in popularity, search algorithms have...
Beate Krause, Andreas Hotho, Gerd Stumme
WSC
2000
13 years 9 months ago
Input modeling using a computer algebra system
Input modeling that involves fitting standard univariate parametric probability distributions is typically performed using an input modeling package. These packages typically fit ...
Diane L. Evans, Lawrence Leemis

Publication
323views
13 years 8 months ago
Reconstruction of snow and ice surfaces using multiple view  vision techniques
In this paper we describe a vision system for reconstructing the relative structure of snow and ice surfaces. This effort is one step toward the long-term goal of rendering absol...
GOWRI SOMANATH , ROHITH MV , CATHLEEN A. GEIGER ...