Sciweavers

1414 search results - page 250 / 283
» Combining Intruder Theories
Sort
View
80
Voted
CIKM
2007
Springer
15 years 3 months ago
Extending query translation to cross-language query expansion with markov chain models
Dictionary-based approaches to query translation have been widely used in Cross-Language Information Retrieval (CLIR) experiments. Using these approaches, translation has been not...
Guihong Cao, Jianfeng Gao, Jian-Yun Nie, Jing Bai
CIKM
2007
Springer
15 years 3 months ago
Improving the classification of newsgroup messages through social network analysis
Newsgroup participants interact with their communities through conversation threads. They may respond to a message to answer a question, debate a topic, support or disagree with a...
Blaz Fortuna, Eduarda Mendes Rodrigues, Natasa Mil...
EMSOFT
2007
Springer
15 years 3 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...
85
Voted
SCHULE
2007
Springer
15 years 3 months ago
Exploratory Learning
: In our department we have a long history of developing interfaces for learning, which are framed by constructivist and constructionist theories of learning. Thus we try to create...
Ivan Kalas, D. Lehotska
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 3 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl