Sciweavers

CORR
2011
Springer
159views Education» more  CORR 2011»
13 years 4 months ago
Automatic Wrappers for Large Scale Web Extraction
Nilesh N. Dalvi, Ravi Kumar, Mohamed A. Soliman
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 4 months ago
Fast Sparse Matrix-Vector Multiplication on GPUs: Implications for Graph Mining
Scaling up the sparse matrix-vector multiplication kernel on modern Graphics Processing Units (GPU) has been at the heart of numerous studies in both academia and industry. In thi...
Xintian Yang, Srinivasan Parthasarathy, Ponnuswamy...
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 4 months ago
A hybrid model for bankruptcy prediction using genetic algorithm, fuzzy c-means and mars
A. Martin, V. Gayathri, G. Saranya, P. Gayathri, P...
CORR
2011
Springer
161views Education» more  CORR 2011»
13 years 4 months ago
Aorta Segmentation for Stent Simulation
Simulation of arterial stenting procedures prior to intervention allows for appropriate device selection as well as highlights potential complications. To this end, we present a fr...
Jan Egger, Bernd Freisleben, Randolph Setser, Rahu...
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 4 months ago
All Roads Lead To Rome
Xin Li
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 4 months ago
Study of Throughput and Delay in Finite-Buffer Line Networks
—In this work, we study the effects of finite buffers on the throughput and delay of line networks with erasure links. We identify the calculation of performance parameters such...
Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri
CORR
2011
Springer
200views Education» more  CORR 2011»
13 years 4 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 4 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip
CORR
2011
Springer
241views Education» more  CORR 2011»
13 years 4 months ago
An Alternating Direction Algorithm for Matrix Completion with Nonnegative Factors
This paper introduces a novel algorithm for the nonnegative matrix factorization and completion problem, which aims to find nonnegative matrices X and Y from a subset of entries o...
Yangyang Xu, Wotao Yin, Zaiwen Wen, Yin Zhang