Sciweavers

5829 search results - page 87 / 1166
» The Practice of Cluster Analysis
Sort
View
152
Voted
MICRO
2007
IEEE
164views Hardware» more  MICRO 2007»
15 years 10 months ago
A Practical Approach to Exploiting Coarse-Grained Pipeline Parallelism in C Programs
The emergence of multicore processors has heightened the need for effective parallel programming practices. In addition to writing new parallel programs, the next generation of pr...
William Thies, Vikram Chandrasekhar, Saman P. Amar...
169
Voted
CSFW
2012
IEEE
13 years 6 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
125
Voted
KDD
2009
ACM
204views Data Mining» more  KDD 2009»
16 years 4 months ago
DOULION: counting triangles in massive graphs with a coin
Counting the number of triangles in a graph is a beautiful algorithmic problem which has gained importance over the last years due to its significant role in complex network analy...
Charalampos E. Tsourakakis, U. Kang, Gary L. Mille...
131
Voted
KDD
2006
ACM
115views Data Mining» more  KDD 2006»
16 years 4 months ago
Aggregating time partitions
Partitions of sequential data exist either per se or as a result of sequence segmentation algorithms. It is often the case that the same timeline is partitioned in many different ...
Evimaria Terzi, Panayiotis Tsaparas, Taneli Mielik...
131
Voted
ICASSP
2007
IEEE
15 years 10 months ago
Feature Selection Based on Fisher Ratio and Mutual Information Analyses for Robust Brain Computer Interface
This paper proposes a novel feature selection method based on twostage analysis of Fisher Ratio and Mutual Information for robust Brain Computer Interface. This method decomposes ...
Tran Huy Dat, Cuntai Guan