Sciweavers

3072 search results - page 282 / 615
» Shape analysis algorithm based on information theory
Sort
View
SIGIR
2009
ACM
15 years 10 months ago
Experiments in CLIR using fuzzy string search based on surface similarity
Cross Language Information Retrieval (CLIR) between languages of the same origin is an interesting topic of research. The similarity of the writing systems used for these language...
Sethuramalingam Subramaniam, Anil Kumar Singh, Pra...
151
Voted
ICFP
2007
ACM
16 years 3 months ago
Relating complexity and precision in control flow analysis
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
David Van Horn, Harry G. Mairson
GLOBECOM
2007
IEEE
15 years 10 months ago
Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...
Qing Chen, Fei Ye, Zhisheng Niu
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
16 years 4 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
EMSOFT
2004
Springer
15 years 9 months ago
Scheduling within temporal partitions: response-time analysis and server design
As the bandwidth of CPUs and networks continues to grow, it becomes more attractive, for efficiency reasons, to share such resources among several applications with the minimum le...
Luís Almeida, Paulo Pedreiras