Sciweavers

2926 search results - page 349 / 586
» Document Analysis
Sort
View
ISSTA
2009
ACM
15 years 11 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
WWW
2009
ACM
16 years 5 months ago
Estimating web site readability using content extraction
Nowadays, information is primarily searched on the WWW. From a user perspective, the readability is an important criterion for measuring the accessibility and thereby the quality ...
Thomas Gottron, Ludger Martin
SIGIR
2009
ACM
15 years 11 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
GIS
1998
ACM
15 years 4 months ago
Aoristic Crime Analysis
Abstract. Crime pattern analysis has tended to focus on `hotspot’ analysis techniques; the identi® cation of areas with higher densities of criminal activity. This paper documen...
Jerry H. Ratcliffe, Michael J. McCullagh
155
Voted
NIPS
2008
15 years 6 months ago
Relative Performance Guarantees for Approximate Inference in Latent Dirichlet Allocation
Hierarchical probabilistic modeling of discrete data has emerged as a powerful tool for text analysis. Posterior inference in such models is intractable, and practitioners rely on...
Indraneel Mukherjee, David M. Blei