Sciweavers

8655 search results - page 1195 / 1731
» Challenges for Trusted Computing
Sort
View
MFCS
2010
Springer
15 years 2 months ago
Weights of Exact Threshold Functions
We consider Boolean exact threshold functions defined by linear equations, and in general degree d polynomials. We give upper and lower bounds on the maximum magnitude (absolute va...
László Babai, Kristoffer Arnsfelt Ha...
NAACL
2010
15 years 2 months ago
Subword Variation in Text Message Classification
For millions of people in less resourced regions of the world, text messages (SMS) provide the only regular contact with their doctor. Classifying messages by medical labels suppo...
Robert Munro, Christopher D. Manning
151
Voted
NAACL
2010
15 years 2 months ago
Detecting Emails Containing Requests for Action
Automatically finding email messages that contain requests for action can provide valuable assistance to users who otherwise struggle to give appropriate attention to the actionab...
Andrew Lampert, Robert Dale, Cécile Paris
RSCTC
2010
Springer
178views Fuzzy Logic» more  RSCTC 2010»
15 years 2 months ago
Blind Music Timbre Source Isolation by Multi- resolution Comparison of Spectrum Signatures
Automatic indexing of music instruments for multi-timbre sounds is challenging, especially when partials from different sources are overlapping with each other. Temporal features, ...
Xin Zhang, Wenxin Jiang, Zbigniew W. Ras, Rory A. ...
153
Voted
SEMWEB
2010
Springer
15 years 2 months ago
Optimizing Enterprise-Scale OWL 2 RL Reasoning in a Relational Database System
OWL 2 RL was standardized as a less expressive but scalable subset of OWL 2 that allows a forward-chaining implementation. However, building an enterprise-scale forward-chaining ba...
Vladimir Kolovski, Zhe Wu, George Eadon
« Prev « First page 1195 / 1731 Last » Next »