Sciweavers

4903 search results - page 126 / 981
» The Set Covering Machine
Sort
View
JMLR
2010
125views more  JMLR 2010»
13 years 4 months ago
On utility of gene set signatures in gene expression-based cancer class prediction
Machine learning methods that can use additional knowledge in their inference process are central to the development of integrative bioinformatics. Inclusion of background knowled...
Minca Mramor, Marko Toplak, Gregor Leban, Tomaz Cu...
PPOPP
2009
ACM
14 years 9 months ago
Serialization sets: a dynamic dependence-based parallel execution model
This paper proposes a new parallel execution model where programmers augment a sequential program with pieces of code called serializers that dynamically map computational operati...
Matthew D. Allen, Srinath Sridharan, Gurindar S. S...
ISCA
1998
IEEE
107views Hardware» more  ISCA 1998»
14 years 1 months ago
Memory Dependence Prediction Using Store Sets
For maximum performance, an out-of-order processor must issue load instructions as early as possible, while avoiding memory-order violations with prior store instructions that wri...
George Z. Chrysos, Joel S. Emer
ASPDAC
2000
ACM
83views Hardware» more  ASPDAC 2000»
14 years 1 months ago
A new approach to assembly software retargeting for microcontrollers
A new approach is proposed to translate existing software programs from one instruction set to other instruction sets at the level. The behaviors of instructions are abstractly re...
Ing-Jer Huang, Dao-Zhen Chen
EUROSEC
2010
ACM
14 years 2 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani