Sciweavers

16160 search results - page 3099 / 3232
» How to approach humans
Sort
View
KDD
2009
ACM
200views Data Mining» more  KDD 2009»
14 years 3 months ago
Visual analysis of documents with semantic graphs
In this paper, we present a technique for visual analysis of documents based on the semantic representation of text in the form of a directed graph, referred to as semantic graph....
Delia Rusu, Blaz Fortuna, Dunja Mladenic, Marko Gr...
VMCAI
2009
Springer
14 years 3 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
CCGRID
2009
IEEE
14 years 3 months ago
Markov Model Based Disk Power Management for Data Intensive Workloads
—In order to meet the increasing demands of present and upcoming data-intensive computer applications, there has been a major shift in the disk subsystem, which now consists of m...
Rajat Garg, Seung Woo Son, Mahmut T. Kandemir, Pad...
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
14 years 3 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
14 years 2 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
« Prev « First page 3099 / 3232 Last » Next »