Sciweavers

575 search results - page 104 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
72
Voted
SIGIR
2005
ACM
15 years 3 months ago
Web-based acquisition of Japanese katakana variants
This paper describes a method of detecting Japanese Katakana variants from a large corpus. Katakana words, which are mainly used as loanwords, cause problems with information retr...
Takeshi Masuyama, Hiroshi Nakagawa
80
Voted
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 3 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
RTCSA
2003
IEEE
15 years 3 months ago
Real-Time Disk Scheduling with On-Disk Cache Conscious
Previous real-time disk scheduling algorithms assume that each disk request incurs a disk mechanical operation and only consider how to move the disk head under real-time constrain...
Hsung-Pin Chang, Ray-I Chang, Wei Kuan Shih, Ruei-...
78
Voted
SIGIR
2003
ACM
15 years 2 months ago
Probabilistic term variant generator for biomedical terms
This paper presents an algorithm to generate possible variants for biomedical terms. The algorithm gives each variant its generation probability representing its plausibility, whi...
Yoshimasa Tsuruoka, Jun-ichi Tsujii
AGP
1999
IEEE
15 years 2 months ago
ACI1 constraints
Disunification is the problem of deciding satisfiability of a system of equations and disequations with respect to a given equational theory. In this paper we study the disunifica...
Agostino Dovier, Carla Piazza, Enrico Pontelli, Gi...