Sciweavers

221 search results - page 42 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
14 years 6 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
COLING
2000
13 years 7 months ago
A Model of Competence for Corpus-Based Machine Translation
A translation is a conversion from a source language into a target language preserving the meaning. A huge number of techniques and computational approaches have been experimented...
Michael Carl
DSS
2006
138views more  DSS 2006»
13 years 6 months ago
Design of a shopbot and recommender system for bundle purchases
The increasing proliferation of online shopping and purchasing has naturally led to a growth in the popularity of comparisonshopping search engines, popularly known as "shopb...
Robert S. Garfinkel, Ram D. Gopal, Arvind K. Tripa...
IMC
2007
ACM
13 years 7 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
IDA
1998
Springer
13 years 6 months ago
Self-Organized-Expert Modular Network for Classification of Spatiotemporal Sequences
We investigate a form of modular neural network for classification with (a) pre-separated input vectors entering its specialist (expert) networks, (b) specialist networks which ar...
Sylvian R. Ray, William H. Hsu