Sciweavers

739 search results - page 39 / 148
» Resources for Evaluation of Summarization Techniques
Sort
View
TRECVID
2008
15 years 1 months ago
Tokyo Tech at TRECVID 2008
The Tokyo Institute of Technology team participated in the high-level feature extraction, surveillance event detection pilot and Rushes summarization tasks for TRECVID2008. In the...
Shanshan Hao, Yusuke Yoshizawa, Koji Yamasaki, Koi...
SIGCOMM
2010
ACM
15 years 1 days ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
ICEIS
2003
IEEE
15 years 5 months ago
Live-Representation Process Management
Abstract: We present the live-representation approach for managing and working in complex, dynamic business processes. In this approach, aspects of business-process modeling, proje...
Daniel D. Corkill, Zachary B. Rubinstein, Susan E....
INTERSPEECH
2010
14 years 6 months ago
Verifying pronunciation dictionaries using conflict analysis
We describe a new language-independent technique for automatically identifying errors in an electronic pronunciation dictionary by analyzing the source of conflicting patterns dir...
Marelie H. Davel, Febe de Wet
DSRT
2008
IEEE
15 years 1 months ago
Evaluating Large Scale Distributed Simulation of P2P Networks
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...