Sciweavers

2553 search results - page 361 / 511
» Modeling Trees with Hypertextures
Sort
View
ISI
2006
Springer
14 years 10 months ago
Multi-document Summarization for Terrorism Information Extraction
Abstract. Counterterrorism is one of the major challenges to the society. In order to flight again the terrorists, it is very important to have a through understanding of the terro...
Fu Lee Wang, Christopher C. Yang, Xiaodong Shi
CSL
2007
Springer
14 years 10 months ago
Stochastic and syntactic techniques for predicting phrase breaks
Determining the position of breaks in a sentence is a key task for a text-to-speech (TTS) system. We describe some methods for phrase break prediction in which the whole sentence ...
Ian Read, Stephen Cox
82
Voted
JPDC
2008
92views more  JPDC 2008»
14 years 10 months ago
Techniques for pipelined broadcast on ethernet switched clusters
By splitting a large broadcast message into segments and broadcasting the segments in a pipelined fashion, pipelined broadcast can achieve high performance in many systems. In thi...
Pitch Patarasuk, Xin Yuan, Ahmad Faraj
JACM
2000
131views more  JACM 2000»
14 years 10 months ago
The soft heap: an approximate priority queue with optimal error rate
A simple variant of a priority queue, called a soft heap, is introduced. The data structure supports the usual operations: insert, delete, meld, and findmin. Its novelty is to beat...
Bernard Chazelle
MMS
2000
14 years 10 months ago
Video Placement and Configuration of Distributed Video Servers on Cable TV Networks
A large-scale, distributed video-on-demand (VOD) system allows geographically dispersed residential and business users to access video services, such as movies and other multimedia...
Constantinos Vassilakis, Michael Paterakis, Peter ...