Sciweavers

1518 search results - page 113 / 304
» Cryptographic Test Correction
Sort
View
91
Voted
LREC
2008
123views Education» more  LREC 2008»
15 years 5 months ago
Identification of Naturally Occurring Numerical Expressions in Arabic
In this paper, we define the task of Number Identification in natural context. We present and validate a language-independent semiautomatic approach to quickly building a gold sta...
Nizar Habash, Ryan Roth
140
Voted
RIAO
2007
15 years 5 months ago
Homepage Finding in Hybrid Peer-to-Peer Networks
This paper illustrates a ranking scheme which combines fulltext, anchor text and URL structure for homepage finding in hybrid peer-to-peer networks. The experimental results show...
Enrico Bragante, Massimo Melucci
123
Voted
SSR
1997
93views more  SSR 1997»
15 years 5 months ago
Using Content-Derived Names for Configuration Management
Configuration management of compiled software artifacts (programs, libraries, icons, etc.) is a growing problem as software reuse becomes more prevalent. For an application compos...
Jeffrey K. Hollingsworth, Ethan L. Miller
122
Voted
ICPR
2010
IEEE
15 years 4 months ago
The Balanced Accuracy and Its Posterior Distribution
—Evaluating the performance of a classification algorithm critically requires a measure of the degree to which unseen examples have been identified with their correct class lab...
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno ...
140
Voted
NGC
2008
Springer
149views Communications» more  NGC 2008»
15 years 3 months ago
A New Type System for JVM Lock Primitives
A bytecode verifier for the Java virtual machine language (JVML) statically checks that bytecode does not cause any fatal error. However, the present verifier does not check correc...
Futoshi Iwama, Naoki Kobayashi