Sciweavers

1262 search results - page 66 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
TJS
2002
135views more  TJS 2002»
13 years 8 months ago
HPCVIEW: A Tool for Top-down Analysis of Node Performance
Although it is increasingly difficult for large scientific programs to attain a significant fraction of peak performance on systems based on microprocessors with substantial instr...
John M. Mellor-Crummey, Robert J. Fowler, Gabriel ...
SDM
2007
SIAM
147views Data Mining» more  SDM 2007»
13 years 10 months ago
Constraint-Based Pattern Set Mining
Local pattern mining algorithms generate sets of patterns, which are typically not directly useful and have to be further processed before actual application or interpretation. Ra...
Luc De Raedt, Albrecht Zimmermann
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
14 years 4 months ago
Cartesian contour: a concise representation for a collection of frequent sets
In this paper, we consider a novel scheme referred to as Cartesian contour to concisely represent the collection of frequent itemsets. Different from the existing works, this sche...
Ruoming Jin, Yang Xiang, Lin Liu
CIDM
2009
IEEE
14 years 4 months ago
Diversity analysis on imbalanced data sets by using ensemble models
— Many real-world applications have problems when learning from imbalanced data sets, such as medical diagnosis, fraud detection, and text classification. Very few minority clas...
Shuo Wang, Xin Yao
ICIP
2005
IEEE
14 years 11 months ago
Generalized optimal thresholding for biometric key generation using face images
1 In this paper, we study biometric key generation using face images. Given a face image, a set of biometric features are extracted. Each feature is compared with a threshold to ge...
Wende Zhang, Tsuhan Chen