Sciweavers

3628 search results - page 575 / 726
» Approaching the Physical Limits of Computing
Sort
View
ACL
2010
14 years 11 months ago
Phrase-Based Statistical Language Generation Using Graphical Models and Active Learning
Most previous work on trainable language generation has focused on two paradigms: (a) using a statistical model to rank a set of generated utterances, or (b) using statistics to i...
François Mairesse, Milica Gasic, Filip Jurc...
111
Voted
ACL
2010
14 years 11 months ago
Event-Based Hyperspace Analogue to Language for Query Expansion
Bag-of-words approaches to information retrieval (IR) are effective but assume independence between words. The Hyperspace Analogue to Language (HAL) is a cognitively motivated and...
Tingxu Yan, Tamsin Maxwell, Dawei Song, Yuexian Ho...
95
Voted
EGH
2010
Springer
14 years 10 months ago
Restart trail for stackless BVH traversal
A ray cast algorithm utilizing a hierarchical acceleration structure needs to perform a tree traversal in the hierarchy. In its basic form, executing the traversal requires a stac...
Samuli Laine
ERSA
2010
199views Hardware» more  ERSA 2010»
14 years 10 months ago
Reconfigurable Sparse Matrix-Vector Multiplication on FPGAs
Cache-based, general purpose CPUs perform at a small fraction of their maximum floating point performance when executing memory-intensive simulations, such as those required for sp...
Russell Tessier, Salma Mirza, J. Blair Perot
INFOCOM
2010
IEEE
14 years 10 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...