Sciweavers

115 search results - page 15 / 23
» Cover Page
Sort
View
TOSEM
2008
117views more  TOSEM 2008»
14 years 9 months ago
Power laws in software
e than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software e...
Panagiotis Louridas, Diomidis Spinellis, Vasileios...
IJPRAI
2002
142views more  IJPRAI 2002»
14 years 9 months ago
Improving Encarta Search Engine Performance by Mining User Logs
We propose a data-mining approach that produces generalized query patterns (with generalized keywords) from the raw user logs of the Microsoft Encarta search engine (http://encart...
Charles X. Ling, Jianfeng Gao, Huajie Zhang, Weini...
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 4 months ago
From Machine Learning to Machine Reasoning
A plausible definition of "reasoning" could be "algebraically manipulating previously acquired knowledge in order to answer a new question". This definition co...
Léon Bottou
PAMI
2010
207views more  PAMI 2010»
14 years 4 months ago
Document Ink Bleed-Through Removal with Two Hidden Markov Random Fields and a Single Observation Field
We present a new method for blind document bleed through removal based on separate Markov Random Field (MRF) regularization for the recto and for the verso side, where separate pri...
Christian Wolf
ICDE
2001
IEEE
167views Database» more  ICDE 2001»
15 years 10 months ago
Database Managed External File Update
RDBMS's have evolved to an extent that they are used to manage almost all of traditional business data in a robust fashion. Nevertheless, a large fraction of unstructured and...
Neeraj Mittal, Hui-I Hsiao