Sciweavers

897 search results - page 121 / 180
» Identity: How to name it, How to find it
Sort
View
COMPGEOM
2003
ACM
15 years 6 months ago
Controlled perturbation for arrangements of circles
Given a collection C of circles in the plane, we wish to construct the arrangement A(C) (namely the subdivision of the plane into vertices, edges and faces induced by C) using fl...
Dan Halperin, Eran Leiserowitz
127
Voted
MCS
2002
Springer
15 years 1 months ago
Multiclassifier Systems: Back to the Future
Abstract. While a variety of multiple classifier systems have been studied since at least the late 1950's, this area came alive in the 90's with significant theoretical a...
Joydeep Ghosh
TON
2002
125views more  TON 2002»
15 years 1 months ago
Multicast-based inference of network-internal delay distributions
Packet delay greatly influences the overall performance of network applications. It is therefore important to identify causes and location of delay performance degradation within ...
Francesco Lo Presti, Nick G. Duffield, Joseph Horo...
107
Voted
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 2 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
ECTEL
2009
Springer
15 years 8 months ago
Distributed Awareness for Class Orchestration
The orchestration process consists of managing classroom interactions at multiple levels: individual activities, teamwork and class-wide sessions. We study the process of orchestra...
Hamed S. Alavi, Pierre Dillenbourg, Fréd&ea...