Sciweavers

1790 search results - page 356 / 358
» Automatic Keyword Extraction Using Domain Knowledge
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 10 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
HRI
2007
ACM
13 years 10 months ago
Efficient model learning for dialog management
Intelligent planning algorithms such as the Partially Observable Markov Decision Process (POMDP) have succeeded in dialog management applications [10, 11, 12] because of their rob...
Finale Doshi, Nicholas Roy
AIEDU
2007
86views more  AIEDU 2007»
13 years 6 months ago
A Study of Feedback Strategies in Foreign Language Classrooms and Tutorials with Implications for Intelligent Computer-Assisted
This paper presents two new corpus-based studies of feedback in the domain of teaching Spanish as a foreign language, concentrating on the type and frequency of different feedback ...
Anita Ferreira, Johanna D. Moore, Chris Mellish
KDD
2012
ACM
168views Data Mining» more  KDD 2012»
11 years 8 months ago
Mining contentions from discussions and debates
Social media has become a major source of information for many applications. Numerous techniques have been proposed to analyze network structures and text contents. In this paper,...
Arjun Mukherjee, Bing Liu 0001
LCTRTS
2005
Springer
13 years 11 months ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...