Sciweavers

653 search results - page 105 / 131
» Factored Planning: How, When, and When Not
Sort
View
VTC
2010
IEEE
110views Communications» more  VTC 2010»
15 years 8 days ago
Internet Access Performance in LTE TDD
The Time Division Duplex (TDD) uplink-downlink configuration of the 3GPP Long Term Evolution (LTE) determines how the ten subframes in a radio frame are divided between the downlin...
Riikka Susitaival, Henning Wiemann, J. Ostergaard,...
ACL
2010
14 years 12 months ago
On Jointly Recognizing and Aligning Bilingual Named Entities
We observe that (1) how a given named entity (NE) is translated (i.e., either semantically or phonetically) depends greatly on its associated entity type, and (2) entities within ...
Yufeng Chen, Chengqing Zong, Keh-Yih Su
SIGSOFT
2010
ACM
14 years 11 months ago
Developer fluency: achieving true mastery in software projects
Outsourcing and offshoring lead to a rapid influx of new developers in software projects. That, in turn, manifests in lower productivity and project delays. To address this common...
Minghui Zhou, Audris Mockus
CORR
2010
Springer
91views Education» more  CORR 2010»
14 years 9 months ago
Switching between Hidden Markov Models using Fixed Share
In prediction with expert advice the goal is to design online prediction algorithms that achieve small regret (additional loss on the whole data) compared to a reference scheme. I...
Wouter M. Koolen, Tim van Erven
CHI
2011
ACM
14 years 5 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi