Sciweavers

3441 search results - page 674 / 689
» Intelligent Computation of Presentation Documents
Sort
View
KDD
2004
ACM
179views Data Mining» more  KDD 2004»
16 years 3 days ago
1-dimensional splines as building blocks for improving accuracy of risk outcomes models
Transformation of both the response variable and the predictors is commonly used in fitting regression models. However, these transformation methods do not always provide the maxi...
David S. Vogel, Morgan C. Wang
ASPLOS
2010
ACM
15 years 6 months ago
Shoestring: probabilistic soft error reliability on the cheap
Aggressive technology scaling provides designers with an ever increasing budget of cheaper and faster transistors. Unfortunately, this trend is accompanied by a decline in individ...
Shuguang Feng, Shantanu Gupta, Amin Ansari, Scott ...
HRI
2009
ACM
15 years 6 months ago
How search and its subtasks scale in N robots
The present study investigates the effect of the number of controlled robots on performance of an urban search and rescue (USAR) task using a realistic simulation. Participants co...
Huadong Wang, Michael Lewis, Prasanna Velagapudi, ...
112
Voted
CIKM
2009
Springer
15 years 6 months ago
Generating comparative summaries of contradictory opinions in text
This paper presents a study of a novel summarization problem called contrastive opinion summarization (COS). Given two sets of positively and negatively opinionated sentences whic...
Hyun Duk Kim, ChengXiang Zhai
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 6 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq