Sciweavers

292 search results - page 29 / 59
» Exploiting Dead Value Information
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Resolving FD-BSS permutation for arbitrary array in presence of spatial aliasing
This paper presents a novel method for solving the permutation problem inherent to frequency domain blind signal separation of multiple simultaneous speakers. As conventional meth...
Jani Even, Norihiro Hagita
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 2 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
HPCA
2003
IEEE
14 years 8 months ago
Dynamic Data Dependence Tracking and its Application to Branch Prediction
To continue to improve processor performance, microarchitects seek to increase the effective instruction level parallelism (ILP) that can be exploited in applications. A fundament...
Lei Chen, Steve Dropsho, David H. Albonesi
RECSYS
2009
ACM
14 years 2 months ago
Context-based splitting of item ratings in collaborative filtering
Collaborative Filtering (CF) recommendations are computed by leveraging a historical data set of users’ ratings for items. It assumes that the users’ previously recorded ratin...
Linas Baltrunas, Francesco Ricci
ISCIS
2004
Springer
14 years 27 days ago
Thread-Sensitive Points-to Analysis for Multithreaded Java Programs
Abstract. Every running thread has its own thread context that consists of values of the fields of the target thread object. To consider the thread context in understanding the be...
Byeong-Mo Chang, Jong-Deok Choi