Sciweavers

1748 search results - page 102 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
ASAP
2006
IEEE
89views Hardware» more  ASAP 2006»
14 years 1 months ago
Polyhedral Modeling and Analysis of Memory Access Profiles
In this paper, we propose to model memory access profile information as loop nests exhibiting useful characteristics on the memory behavior, such as periodicity, linearly linked m...
Philippe Clauss, Bénédicte Kenmei
CIBCB
2005
IEEE
14 years 2 months ago
Feature Selection for Microarray Data Using Least Squares SVM and Particle Swarm Optimization
Feature selection is an important preprocessing technique for many pattern recognition problems. When the number of features is very large while the number of samples is relatively...
E. Ke Tang, Ponnuthurai N. Suganthan, Xin Yao
GIS
2009
ACM
14 years 10 months ago
From GPS Traces to a Routable Road Map
This paper presents a method for automatically converting raw GPS traces from everyday vehicles into a routable road network. The method begins by smoothing raw GPS traces using a...
Lili Cao, John Krumm
EUC
2005
Springer
14 years 2 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
DL
1999
Springer
129views Digital Library» more  DL 1999»
14 years 1 months ago
Web Analysis Visualization Spreadsheet
In this paper, we present methods of information visualization that applies to the discovery of patterns in World-Wide Web sites. We hope to use techniques of information visualiz...
Ed Huai-hsin Chi