Sciweavers

15781 search results - page 3062 / 3157
» Evaluating Information Extraction
Sort
View
130
Voted
ICDM
2006
IEEE
132views Data Mining» more  ICDM 2006»
15 years 9 months ago
High Quality, Efficient Hierarchical Document Clustering Using Closed Interesting Itemsets
High dimensionality remains a significant challenge for document clustering. Recent approaches used frequent itemsets and closed frequent itemsets to reduce dimensionality, and to...
Hassan H. Malik, John R. Kender
154
Voted
ICDM
2006
IEEE
130views Data Mining» more  ICDM 2006»
15 years 9 months ago
A Framework for Regional Association Rule Mining in Spatial Datasets
The immense explosion of geographically referenced data calls for efficient discovery of spatial knowledge. One critical requirement for spatial data mining is the capability to ...
Wei Ding 0003, Christoph F. Eick, Jing Wang 0007, ...
113
Voted
IEEEPACT
2006
IEEE
15 years 9 months ago
Overlapping dependent loads with addressless preload
Modern out-of-order processors with non-blocking caches exploit Memory-Level Parallelism (MLP) by overlapping cache misses in a wide instruction window. The exploitation of MLP, h...
Zhen Yang, Xudong Shi, Feiqi Su, Jih-Kwon Peir
115
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Self-Learning Collision Avoidance for Wireless Networks
— The limited number of orthogonal channels and the autonomous installations of hotspots and home wireless networks often leave neighboring 802.11 basic service sets (BSS’s) op...
Chun-cheng Chen, Eunsoo Seo, Hwangnam Kim, Haiyun ...
146
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
« Prev « First page 3062 / 3157 Last » Next »