Sciweavers

ICS
2010
Tsinghua U.
14 years 1 months ago
Speeding up Nek5000 with autotuning and specialization
Autotuning technology has emerged recently as a systematic process for evaluating alternative implementations of a computation, in order to select the best-performing solution for...
Jaewook Shin, Mary W. Hall, Jacqueline Chame, Chun...
BTW
2009
Springer
90views Database» more  BTW 2009»
14 years 2 months ago
Streaming Web Services and Standing Processes
: Today, service orientation is a well established concept in modern IT infrastructures. Web services and WS-BPEL as the two key technologies handle large structured data sets very...
Steffen Preissler, Hannes Voigt, Dirk Habich, Wolf...
SIGMOD
2000
ACM
173views Database» more  SIGMOD 2000»
14 years 2 months ago
Efficient Algorithms for Mining Outliers from Large Data Sets
In this paper, we propose a novel formulation for distance-based outliers that is based on the distance of a point from its kth nearest neighbor. We rank each point on the basis o...
Sridhar Ramaswamy, Rajeev Rastogi, Kyuseok Shim
BIBE
2001
IEEE
179views Bioinformatics» more  BIBE 2001»
14 years 2 months ago
Texture-Based 3-D Brain Imaging
Different modalities in biomedical imaging, like CT, MRI and PET scanners, provide detailed crosssectional views of the human anatomy. The imagery obtained from these scanning dev...
Sagar Saladi, Pujita Pinnamaneni, Joerg Meyer
GECCO
2006
Springer
214views Optimization» more  GECCO 2006»
14 years 2 months ago
A new discrete particle swarm algorithm applied to attribute selection in a bioinformatics data set
Many data mining applications involve the task of building a model for predictive classification. The goal of such a model is to classify examples (records or data instances) into...
Elon S. Correa, Alex Alves Freitas, Colin G. Johns...
DAWAK
2006
Springer
14 years 2 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
CIKM
2006
Springer
14 years 2 months ago
Finding highly correlated pairs efficiently with powerful pruning
We consider the problem of finding highly correlated pairs in a large data set. That is, given a threshold not too small, we wish to report all the pairs of items (or binary attri...
Jian Zhang, Joan Feigenbaum
DASFAA
2004
IEEE
134views Database» more  DASFAA 2004»
14 years 2 months ago
Applying Co-training to Clickthrough Data for Search Engine Adaptation
The information on the World Wide Web is growing without bound. Users may have very diversified preferences in the pages they target through a search engine. It is therefore a chal...
Qingzhao Tan, Xiaoyong Chai, Wilfred Ng, Dik Lun L...
CSB
2004
IEEE
14 years 2 months ago
MISAE: A New Approach for Regulatory Motif Extraction
The recognition of regulatory motifs of co-regulated genes is essential for understanding the regulatory mechanisms. However, the automatic extraction of regulatory motifs from a ...
Zhaohui Sun, Jingyi Yang, Jitender S. Deogun
ATAL
2006
Springer
14 years 2 months ago
Predicting people's bidding behavior in negotiation
This paper presents a statistical learning approach to predicting people's bidding behavior in negotiation. Our study consists of multiple 2-player negotiation scenarios wher...
Ya'akov Gal, Avi Pfeffer