2018
DOI: 10.1007/978-981-10-8657-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Runtime Performance Optimization Using Template-Metaprogramming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…With the appearance of social media and blogs, the worth of text-based data continues to extend. The sensible application of extract worth from text is increasing seen in areas like click-based internet promoting, client segmentation, and sentiment analysis of Twitter and Facebook comments [1,13,14]. The matter in analyzing an oversized corpus of text is to get the structure and arrangement of words at intervals the info so as to research the corpus exploitation machine ways.…”
Section: Natural Language Processingmentioning
confidence: 99%
“…With the appearance of social media and blogs, the worth of text-based data continues to extend. The sensible application of extract worth from text is increasing seen in areas like click-based internet promoting, client segmentation, and sentiment analysis of Twitter and Facebook comments [1,13,14]. The matter in analyzing an oversized corpus of text is to get the structure and arrangement of words at intervals the info so as to research the corpus exploitation machine ways.…”
Section: Natural Language Processingmentioning
confidence: 99%
“…The constraints of conventional security administration innovations are getting to be more genuine given this exponential development of new security dangers, quick changes of new IT advancements, and noteworthy deficiency of security experts. A large portion of these assaulting methods is acknowledged through spreading traded off URLs [9,10] (or the spreading of such URLs frames a basic some portion of the assaulting activity). URL is the condensing of Uniform Resource Locator, which is the worldwide address of records and different assets on…”
Section: Fig11 Screenshot Of a Phishing Websitementioning
confidence: 99%
“…The proposed work utilizes number of steps, for example, accumulation of movie audits datasets, pre-handling, include choice, order strategies. Result demonstrates that list technique gives better execution with SVM for arrangement for vast amount of dataset and Correlation based component choice with SVM for the little amount of dataset [15]. Bogdon Batrinca "unpublished" proposed a plan of programming device for internet-based life, web journals, talks, newsfeeds and so on and how to utilize them for scratching, purifying and analyzing [4].…”
Section: Related Workmentioning
confidence: 99%