Sciweavers

90 search results - page 5 / 18
» Exploiting purity for atomicity
Sort
View
CORR
2010
Springer
210views Education» more  CORR 2010»
13 years 7 months ago
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
Tomer Faktor, Yonina C. Eldar, Michael Elad
TASLP
2008
141views more  TASLP 2008»
13 years 7 months ago
Unsupervised Pattern Discovery in Speech
We present a novel approach to speech processing based on the principle of pattern discovery. Our work represents a departure from traditional models of speech recognition, where t...
A. S. Park, J. R. Glass
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
13 years 5 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...
IRFC
2011
Springer
12 years 11 months ago
Multilingual Document Clustering Using Wikipedia as External Knowledge
This paper presents Multilingual Document Clustering (MDC) on comparable corpora. Wikipedia, a structured multilingual knowledge base, has been highly exploited in many monolingual...
N. Kiran Kumar, G. S. K. Santosh, Vasudeva Varma
ICPP
2008
IEEE
14 years 2 months ago
Implementing and Exploiting Inevitability in Software Transactional Memory
—Transactional Memory (TM) takes responsibility for concurrent, atomic execution of labeled regions of code, freeing the programmer from the need to manage locks. Typical impleme...
Michael F. Spear, Michael Silverman, Luke Dalessan...