Sciweavers

1997 search results - page 340 / 400
» A Model for Data Leakage Detection
Sort
View
CPAIOR
2009
Springer
15 years 6 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
JCDL
2009
ACM
127views Education» more  JCDL 2009»
15 years 6 months ago
Finding topic trends in digital libraries
We propose a generative model based on latent Dirichlet allocation for mining distinct topics in document collections by integrating the temporal ordering of documents into the ge...
Levent Bolelli, Seyda Ertekin, Ding Zhou, C. Lee G...
SIGIR
2009
ACM
15 years 6 months ago
Named entity recognition in query
This paper addresses the problem of Named Entity Recognition in Query (NERQ), which involves detection of the named entity in a given query and classification of the named entity...
Jiafeng Guo, Gu Xu, Xueqi Cheng, Hang Li
GLOBECOM
2008
IEEE
15 years 6 months ago
Performance Analysis of Free-Space Optical Systems in Gamma-Gamma Fading
— Atmospheric turbulence induced fading is one of the main impairments affecting free–space optics (FSO). In recent years, Gamma–Gamma fading has become the dominant fading m...
Ehsan Bayaki, Robert Schober, Ranjan K. Mallik
IROS
2008
IEEE
181views Robotics» more  IROS 2008»
15 years 6 months ago
Scalable Bayesian human-robot cooperation in mobile sensor networks
— In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Humancompute...
Frédéric Bourgault, Aakash Chokshi, ...