Sciweavers

1351 search results - page 226 / 271
» Learning from compressed observations
Sort
View
ICSE
1995
IEEE-ACM
15 years 1 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
AAAI
2007
15 years 7 days ago
Turning Lectures into Comic Books Using Linguistically Salient Gestures
Creating video recordings of events such as lectures or meetings is increasingly inexpensive and easy. However, reviewing the content of such video may be time-consuming and difï¬...
Jacob Eisenstein, Regina Barzilay, Randall Davis
LISA
2007
15 years 7 days ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
CIKM
2008
Springer
14 years 12 months ago
Identification of class specific discourse patterns
In this paper we address the problem of extracting important (and unimportant) discourse patterns from call center conversations. Call centers provide dialog based calling-in supp...
Anup Chalamalla, Sumit Negi, L. Venkata Subramania...
AAAI
2010
14 years 11 months ago
A Bayesian Nonparametric Approach to Modeling Mobility Patterns
Constructing models of mobile agents can be difficult without domain-specific knowledge. Parametric models flexible enough to capture all mobility patterns that an expert believes...
Joshua Mason Joseph, Finale Doshi-Velez, Nicholas ...