Sciweavers

20294 search results - page 4044 / 4059
» Algorithmic Information Theory
Sort
View
143
Voted
ACL
2010
15 years 2 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
153
Voted
BIBM
2010
IEEE
144views Bioinformatics» more  BIBM 2010»
15 years 2 months ago
Identification and quantification of abundant species from pyrosequences of 16S rRNA by consensus alignment
16S rRNA gene profiling has recently been boosted by the development of pyrosequencing methods. A common analysis is to group pyrosequences into Operational Taxonomic Units (OTUs),...
Yuzhen Ye
EMNLP
2010
15 years 2 months ago
Holistic Sentiment Analysis Across Languages: Multilingual Supervised Latent Dirichlet Allocation
In this paper, we develop multilingual supervised latent Dirichlet allocation (MLSLDA), a probabilistic generative model that allows insights gleaned from one language's data...
Jordan L. Boyd-Graber, Philip Resnik
137
Voted
HUC
2010
Springer
15 years 2 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
ICSE
2010
IEEE-ACM
15 years 2 months ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan
« Prev « First page 4044 / 4059 Last » Next »