Sciweavers

973 search results - page 146 / 195
» Be Prepared
Sort
View
MT
2002
76views more  MT 2002»
14 years 9 months ago
Embedding Knowledge Elicitation and MT Systems within a Single Architecture
This paper describes Expedition, an environment designed to facilitate the quick ramp-up of MT systems from practically any alphabetic language (L) into English. The central compon...
Marjorie McShane, Sergei Nirenburg, James R. Cowie...
PRL
2002
67views more  PRL 2002»
14 years 9 months ago
A pseudo-nearest-neighbor approach for missing data recovery on Gaussian random data sets
Missing data handling is an important preparation step for most data discrimination or mining tasks. Inappropriate treatment of missing data may cause large errors or false result...
Xiaolu Huang, Qiuming Zhu
MOR
2007
100views more  MOR 2007»
14 years 9 months ago
On Scheduling Fees to Prevent Merging, Splitting, and Transferring of Jobs
A deterministic server is shared by users with identical linear waiting costs, requesting jobs of arbitrary lengths. Shortest jobs are served first for efficiency. The server can...
Hervé Moulin
PVLDB
2008
94views more  PVLDB 2008»
14 years 9 months ago
Dynamic active probing of helpdesk databases
Helpdesk databases are used to store past interactions between customers and companies to improve customer service quality. One common scenario of using helpdesk database is to fi...
Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang,...
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 8 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu