Sciweavers

14386 search results - page 2546 / 2878
» Algorithms for user interfaces
Sort
View
171
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Exploiting query click logs for utterance domain detection in spoken language understanding
In this paper, we describe methods to exploit search queries mined from search engine query logs to improve domain detection in spoken language understanding. We propose extending...
Dilek Hakkani-Tür, Larry Heck, Gökhan T&...
AINA
2010
IEEE
14 years 8 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 8 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
278
Voted
ASUNAM
2011
IEEE
14 years 5 months ago
DisNet: A Framework for Distributed Graph Computation
—With the rise of network science as an exciting interdisciplinary research topic, efficient graph algorithms are in high demand. Problematically, many such algorithms measuring...
Ryan Lichtenwalter, Nitesh V. Chawla
PAMI
2012
13 years 7 months ago
Image Restoration by Matching Gradient Distributions
—The restoration of a blurry or noisy image is commonly performed with a MAP estimator, which maximizes a posterior probability to reconstruct a clean image from a degraded image...
Taeg Sang Cho, Charles Lawrence Zitnick, Neel Josh...
« Prev « First page 2546 / 2878 Last » Next »