Sciweavers

7121 search results - page 1293 / 1425
» Modeling Signs Using Functional Data Analysis
Sort
View
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
15 years 8 months ago
An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method
The push method for data transmission in peer-to-peer system has drawn great interest, since it can efficiently reduce the accumulated latency observed at user nodes. However, it ...
Xin Xiao, Yuanchun Shi, Meng Zhang
CIKM
2007
Springer
15 years 7 months ago
The role of documents vs. queries in extracting class attributes from text
Challenging the implicit reliance on document collections, this paper discusses the pros and cons of using query logs rather than document collections, as self-contained sources o...
Marius Pasca, Benjamin Van Durme, Nikesh Garera
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 7 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
SAC
2005
ACM
15 years 7 months ago
Mining concept associations for knowledge discovery in large textual databases
In this paper, we describe a new approach for mining concept associations from large text collections. The concepts are short sequences of words that occur frequently together acr...
Xiaowei Xu, Mutlu Mete, Nurcan Yuruk
CIKM
2005
Springer
15 years 7 months ago
Novelty detection based on sentence level patterns
The detection of new information in a document stream is an important component of many potential applications. In this paper, a new novelty detection approach based on the identi...
Xiaoyan Li, W. Bruce Croft
« Prev « First page 1293 / 1425 Last » Next »