Sciweavers

7387 search results - page 1386 / 1478
» Knowledge-based data mining
Sort
View
ISPASS
2009
IEEE
15 years 9 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
CCS
2009
ACM
15 years 9 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
102
Voted
GLOBECOM
2009
IEEE
15 years 9 months ago
Rapidly-Deployable Mesh Network Testbed
—This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and mili...
Michael R. Souryal, Andreas Wapf, Nader Moayeri
ICAC
2009
IEEE
15 years 9 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
KBSE
2009
IEEE
15 years 9 months ago
Code Completion from Abbreviated Input
—Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated inp...
Sangmok Han, David R. Wallace, Robert C. Miller
« Prev « First page 1386 / 1478 Last » Next »