Sciweavers

44 search results - page 5 / 9
» Single-Pass Redundancy Addition and Removal
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Improving dependability of network configuration through policy classification
As a network evolves over time, multiple operators modify its configuration, without fully considering what has previously been done. Similar policies are defined more than once, ...
Sihyung Lee, Tina Wong, Hyong S. Kim
CP
2005
Springer
14 years 2 months ago
Conditional Symmetry Breaking
Conditional symmetry arises in a sub-problem of a constraint satisfaction problem, where the sub-problem satisfies some condition under which additional symetries hold. Typically...
Ian P. Gent, Tom Kelsey, Steve Linton, Iain McDona...
DFT
2008
IEEE
107views VLSI» more  DFT 2008»
14 years 3 months ago
Checkpointing of Rectilinear Growth in DNA Self-Assembly
Error detection/correction techniques have been advocated for algorithmic self-assembly. Under rectilinear growth, it requires only two additional tiles, generally referred to as ...
Stephen Frechette, Yong-Bin Kim, Fabrizio Lombardi
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
14 years 2 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
ICML
2010
IEEE
13 years 9 months ago
From Transformation-Based Dimensionality Reduction to Feature Selection
Many learning applications are characterized by high dimensions. Usually not all of these dimensions are relevant and some are redundant. There are two main approaches to reduce d...
Mahdokht Masaeli, Glenn Fung, Jennifer G. Dy