Sciweavers

956 search results - page 125 / 192
» Source Constrained Clustering
Sort
View
CGO
2003
IEEE
15 years 1 months ago
METRIC: Tracking Down Inefficiencies in the Memory Hierarchy via Binary Rewriting
In this paper, we present METRIC, an environment for determining memory inefficiencies by examining data traces. METRIC is designed to alter the performance behavior of applicatio...
Jaydeep Marathe, Frank Mueller, Tushar Mohan, Bron...
CEAS
2008
Springer
14 years 11 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
EMNLP
2008
14 years 11 months ago
Indirect-HMM-based Hypothesis Alignment for Combining Outputs from Machine Translation Systems
This paper presents a new hypothesis alignment method for combining outputs of multiple machine translation (MT) systems. An indirect hidden Markov model (IHMM) is proposed to add...
Xiaodong He, Mei Yang, Jianfeng Gao, Patrick Nguye...
ICHIM
2001
94views more  ICHIM 2001»
14 years 11 months ago
The Niupepa Collection: Opening the Blinds on a Window to the Past
This paper describes the construction and initial usage of a digital library collection of historical newspapers written in the Maori language. The newspapers (Niupepa in Maori) t...
Te Taka Keegan, Mark D. Apperley, Sally Jo Cunning...
WMI
2001
112views more  WMI 2001»
14 years 11 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...