Sciweavers

2774 search results - page 95 / 555
» Exploiting Deep Structure
Sort
View
139
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
ICASSP
2011
IEEE
14 years 6 months ago
Improving kernel-energy trade-offs for machine learning in implantable and wearable biomedical applications
Emerging biomedical sensors and stimulators offer unprecedented modalities for delivering therapy and acquiring physiological signals (e.g., deep brain stimulators). Exploiting th...
Kyong-Ho Lee, Sun-Yuan Kung, Naveen Verma
147
Voted
KCAP
2011
ACM
14 years 5 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...
WADS
1997
Springer
108views Algorithms» more  WADS 1997»
15 years 6 months ago
Dynamic Data Structures for Fat Objects and Their Applications
We present several efficient dynamic data structures for point-enclosure queries, involving convex fat objects in R2 or R3. Our planar structures are actually fitted for a more ...
Alon Efrat, Matthew J. Katz, Frank Nielsen, Micha ...
INFSOF
2002
65views more  INFSOF 2002»
15 years 2 months ago
The documentary structure of source code
Many tools designed to help programmers view and manipulate source code exploit the formal structure of the programming language. Language-based tools use information derived via ...
Michael L. Van de Vanter