Sciweavers

1809 search results - page 223 / 362
» Weakly Computable Real Numbers
Sort
View
ICDM
2006
IEEE
154views Data Mining» more  ICDM 2006»
14 years 4 months ago
Mining and Predicting Duplication over Peer-to-Peer Query Streams
Many previous works of data mining user queries in Peer-to-Peer systems focused their attention on the distribution of query contents. However, few has been done towards a better ...
Shicong Meng, Yifeng Shao, Cong Shi, Dingyi Han, Y...
DAWAK
2000
Springer
14 years 2 months ago
COFE: A Scalable Method for Feature Extraction from Complex Objects
Abstract. Feature Extraction, also known as Multidimensional Scaling, is a basic primitive associated with indexing, clustering, nearest neighbor searching and visualization. We co...
Gabriela Hristescu, Martin Farach-Colton
SDM
2004
SIAM
194views Data Mining» more  SDM 2004»
13 years 11 months ago
Finding Frequent Patterns in a Large Sparse Graph
Graph-based modeling has emerged as a powerful abstraction capable of capturing in a single and unified framework many of the relational, spatial, topological, and other characteri...
Michihiro Kuramochi, George Karypis
IJCSA
2007
130views more  IJCSA 2007»
13 years 10 months ago
Binary Particle Swarm Optimization Based Defensive Islanding Of Large Scale Power Systems
Power system defensive islanding is an efficient way to avoid catastrophic wide area blackouts, such as the 2003 North American Blackout. Finding defensive islands of large-scale ...
Wenxin Liu, Li Liu, David A. Cartes, Ganesh K. Ven...
EUROSYS
2010
ACM
14 years 7 months ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...