Sciweavers

411 search results - page 35 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
WWW
2009
ACM
15 years 10 months ago
Blog credibility ranking by exploiting verified content
People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility ...
Andreas Juffinger, Michael Granitzer, Elisabeth Le...
JCP
2008
206views more  JCP 2008»
14 years 10 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 4 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
WEBI
2010
Springer
14 years 7 months ago
A Scalable Indexing Mechanism for Ontology-Based Information Integration
In recent years, there has been an explosion of publicly available RDF and OWL web pages. Some of these pages are static text files, while others are dynamically generated from la...
Yingjie Li, Abir Qasem, Jeff Heflin
SPEECH
2008
75views more  SPEECH 2008»
14 years 10 months ago
Relations between de-facto criteria in the evaluation of a spoken dialogue system
Evaluation of spoken dialogue systems has been traditionally carried out in terms of instrumentally or expert-derived measures (usually called ``objective" evaluation) and qu...
Zoraida Callejas, Ramón López-C&oacu...