Sciweavers

2376 search results - page 286 / 476
» More Efficient Internal-Regret-Minimizing Algorithms
Sort
View
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 10 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
CODES
2005
IEEE
14 years 3 months ago
Shift buffering technique for automatic code synthesis from synchronous dataflow graphs
This paper proposes a new efficient buffer management technique called shift buffering for automatic code synthesis from synchronous dataflow graphs (SDF). Two previous buffer man...
Hyunok Oh, Nikil D. Dutt, Soonhoi Ha
ACMMSP
2004
ACM
92views Hardware» more  ACMMSP 2004»
14 years 3 months ago
Instruction combining for coalescing memory accesses using global code motion
Instruction combining is an optimization to replace a sequence of instructions with a more efficient instruction yielding the same result in a fewer machine cycles. When we use it...
Motohiro Kawahito, Hideaki Komatsu, Toshio Nakatan...
ICCV
2007
IEEE
14 years 11 months ago
A systematic approach for 2D-image to 3D-range registration in urban environments
The photorealistic modeling of large-scale objects, such as urban scenes, requires the combination of range sensing technology and digital photography. In this paper, we attack th...
Lingyun Liu, Ioannis Stamos