Sciweavers

1594 search results - page 263 / 319
» Fast Prediction on a Tree
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
A detection algorithm for zero-quantized DCT coefficients in JPEG
The discrete cosine transform (DCT) is widely used in image/video coding standards. However, since most DCT coefficients will be quantized to zeros, a large number of redundant co...
Jin Li, Jarmo Takala, Moncef Gabbouj, Hexin Chen
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
14 years 4 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
14 years 4 months ago
A Support Vector Approach to Censored Targets
Censored targets, such as the time to events in survival analysis, can generally be represented by intervals on the real line. In this paper, we propose a novel support vector tec...
Pannagadatta K. Shivaswamy, Wei Chu, Martin Jansch...
IPPS
2007
IEEE
14 years 3 months ago
Performance Analysis of a Family of WHT Algorithms
This paper explores the correlation of instruction counts and cache misses to runtime performance for a large family of divide and conquer algorithms to compute the Walsh–Hadama...
Michael Andrews, Jeremy Johnson
ISCAS
2007
IEEE
173views Hardware» more  ISCAS 2007»
14 years 3 months ago
Critical Charge Characterization for Soft Error Rate Modeling in 90nm SRAM
— Due to continuous technology scaling, the reduction of nodal capacitances and the lowering of power supply voltages result in an ever decreasing minimal charge capable of upset...
Riaz Naseer, Younes Boulghassoul, Jeff Draper, San...