Sciweavers

8699 search results - page 1559 / 1740
» Elements of the Theory of Computation
Sort
View
CGF
2010
142views more  CGF 2010»
14 years 10 months ago
Toward a Lagrangian Vector Field Topology
In this paper we present an extended critical point concept which allows us to apply vector field topology in the case of unsteady flow. We propose a measure for unsteadiness wh...
Raphael Fuchs, Jan Kemmler, Benjamin Schindler, J&...
CORR
2010
Springer
165views Education» more  CORR 2010»
14 years 10 months ago
Monte Carlo Methods for Top-k Personalized PageRank Lists and Name Disambiguation
We study a problem of quick detection of top-k Personalized PageRank lists. This problem has a number of important applications such as finding local cuts in large graphs, estima...
Konstantin Avrachenkov, Nelly Litvak, Danil Nemiro...
ISSRE
2010
IEEE
14 years 10 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
JAIR
2010
130views more  JAIR 2010»
14 years 10 months ago
A Constraint Satisfaction Framework for Executing Perceptions and Actions in Diagrammatic Reasoning
Diagrammatic reasoning (DR) is pervasive in human problem solving as a powerful adjunct to symbolic reasoning based on language-like representations. The research reported in this...
Bonny Banerjee, B. Chandrasekaran
EMNLP
2010
14 years 9 months ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
« Prev « First page 1559 / 1740 Last » Next »