Sciweavers

879 search results - page 163 / 176
» Greedy Attribute Selection
Sort
View
ISCA
2010
IEEE
176views Hardware» more  ISCA 2010»
14 years 4 hour ago
Forwardflow: a scalable core for power-constrained CMPs
Chip Multiprocessors (CMPs) are now commodity hardware, but commoditization of parallel software remains elusive. In the near term, the current trend of increased coreper-socket c...
Dan Gibson, David A. Wood
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
13 years 11 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
CLUSTER
2008
IEEE
13 years 9 months ago
Variable-grain and dynamic work generation for Minimal Unique Itemset mining
Abstract--SUDA2 is a recursive search algorithm for Minimal Unique Itemset detection. Such sets of items are formed via combinations of non-obvious attributes enabling individual r...
Paraskevas Yiapanis, David J. Haglin, Anna M. Mann...
COLING
2008
13 years 9 months ago
A Hybrid Generative/Discriminative Framework to Train a Semantic Parser from an Un-annotated Corpus
We propose a hybrid generative/discriminative framework for semantic parsing which combines the hidden vector state (HVS) model and the hidden Markov support vector machines (HMSV...
Deyu Zhou, Yulan He
APBC
2004
122views Bioinformatics» more  APBC 2004»
13 years 9 months ago
Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1
Mutation in HIV-1 is extremely rapid, a consequence of a low-fidelity viral reverse transcription process. The envelope gene has been shown to accumulate substitutions at a rate o...
Peter L. Meintjes, Allen G. Rodrigo