Sciweavers

2829 search results - page 548 / 566
» Regularization Methods for Additive Models
Sort
View
ICDE
2010
IEEE
251views Database» more  ICDE 2010»
15 years 9 months ago
Viewing a World of Annotations through AnnoVIP
The proliferation of electronic content has notably lead to the apparition of large corpora of interrelated structured documents (such as HTML and XML Web pages) and semantic annot...
Konstantinos Karanasos, Spyros Zoupanos
102
Voted
ICCD
2008
IEEE
221views Hardware» more  ICCD 2008»
15 years 6 months ago
Reversi: Post-silicon validation system for modern microprocessors
— Verification remains an integral and crucial phase of today’s microprocessor design and manufacturing process. Unfortunately, with soaring design complexities and decreasing...
Ilya Wagner, Valeria Bertacco
ITCC
2005
IEEE
15 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 3 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
ISAAC
2004
Springer
112views Algorithms» more  ISAAC 2004»
15 years 3 months ago
Dynamic Tree Cross Products
Abstract. Range searching over tree cross products – a variant of classic range searching – recently has been introduced by Buchsbaum et al. (Proc. 8th ESA, vol. 1879 of LNCS, ...
Marcus Raitner