Sciweavers

3778 search results - page 673 / 756
» Erdos-Ko-Rado for three sets
Sort
View
EMNLP
2010
15 years 2 months ago
Storing the Web in Memory: Space Efficient Language Models with Constant Time Retrieval
We present three novel methods of compactly storing very large n-gram language models. These methods use substantially less space than all known approaches and allow n-gram probab...
David Guthrie, Mark Hepple
ERSA
2010
187views Hardware» more  ERSA 2010»
15 years 2 months ago
An Open Source Circuit Library with Benchmarking Facilities
In this paper, we introduce the open-source PivPav backend tool for reconfigurable computing. Essentially, PivPav provides an interface to a library of digital circuits that are ke...
Mariusz Grad, Christian Plessl
FLAIRS
2010
15 years 2 months ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace
GRC
2010
IEEE
15 years 2 months ago
A Comparative Study of Threshold-Based Feature Selection Techniques
Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality clas...
Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hu...
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
15 years 2 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...