Sciweavers

1759 search results - page 176 / 352
» Using term informativeness for named entity detection
Sort
View
111
Voted
SIGSOFT
2007
ACM
15 years 11 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
TIT
1998
72views more  TIT 1998»
14 years 10 months ago
Runlength Limited Codes for Single Error-Detection and Single Error-Correction with Mixed Type Errors
Abstract—Runlength-limited (RLL) codes are used in magnetic recording. The error patterns that occur with peak detection magnetic recording systems when using a runlength-limited...
Patrick Perry, Mingche Li, Mao Chao Lin, Zhen Zhan...
96
Voted
TSE
1998
85views more  TSE 1998»
14 years 9 months ago
A Methodology for Feature Interaction Detection in the AIN 0.1 Framework
—In this paper, we propose an integrated methodology for specifying AIN and switch-based features and analyzing their interactions in the AIN 0.1 framework. The specification of ...
Fuchun Joseph Lin, Hong Liu, Abhijit Ghosh
104
Voted
ICCV
2011
IEEE
13 years 10 months ago
From Contours to 3D Object Detection and Pose Estimation
This paper addresses view-invariant object detection and pose estimation from a single image. While recent work focuses on object-centered representations of point-based object fe...
Nadia Payet, Sinisa Todorovic
84
Voted
CIKM
2010
Springer
14 years 8 months ago
Context modeling for ranking and tagging bursty features in text streams
Bursty features in text streams are very useful in many text mining applications. Most existing studies detect bursty features based purely on term frequency changes without takin...
Wayne Xin Zhao, Jing Jiang, Jing He, Dongdong Shan...