Sciweavers

3639 search results - page 572 / 728
» Provenance as Dependency Analysis
Sort
View
85
Voted
COLT
2004
Springer
15 years 6 months ago
Concentration Bounds for Unigrams Language Model
Abstract. We show several PAC-style concentration bounds for learning unigrams language model. One interesting quantity is the probability of all words appearing exactly k times in...
Evgeny Drukh, Yishay Mansour
105
Voted
ER
2004
Springer
161views Database» more  ER 2004»
15 years 6 months ago
Applying the Application-Based Domain Modeling Approach to UML Structural Views
Being part of domain engineering, domain analysis enables identifying domains and capturing their ontologies in order to assist and guide system developers to design domain-specifi...
Arnon Sturm, Iris Reinhartz-Berger
99
Voted
HSNMC
2004
Springer
158views Multimedia» more  HSNMC 2004»
15 years 6 months ago
HMM-Based Monitoring of Packet Channels
Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network feat...
Pierluigi Salvo Rossi, Francesco Palmieri, Giulio ...
MKM
2004
Springer
15 years 6 months ago
A Graph-Based Approach Towards Discerning Inherent Structures in a Digital Library of Formal Mathematics
As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, ...
Lori Lorigo, Jon M. Kleinberg, Richard Eaton, Robe...
119
Voted
MMB
2004
Springer
149views Communications» more  MMB 2004»
15 years 6 months ago
Relating Query Popularity and File Replication in the Gnutella Peer-to-Peer Network
In this paper, we characterize the user behavior in a peer-to-peer (P2P) file sharing network. Our characterization is based on the results of an extensive passive measurement stu...
Alexander Klemm, Christoph Lindemann, Oliver P. Wa...