Sciweavers

1759 search results - page 259 / 352
» Using term informativeness for named entity detection
Sort
View
CCS
2007
ACM
15 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
KDD
2001
ACM
359views Data Mining» more  KDD 2001»
15 years 10 months ago
Data mining techniques to improve forecast accuracy in airline business
Predictive models developed by applying Data Mining techniques are used to improve forecasting accuracy in the airline business. In order to maximize the revenue on a flight, the ...
Christoph Hueglin, Francesco Vannotti
SAC
2009
ACM
15 years 4 months ago
Applying latent dirichlet allocation to group discovery in large graphs
This paper introduces LDA-G, a scalable Bayesian approach to finding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
Keith Henderson, Tina Eliassi-Rad
ISMIR
2005
Springer
160views Music» more  ISMIR 2005»
15 years 3 months ago
Finding An Optimal Segmentation for Audio Genre Classification
In the automatic classification of music many different segmentations of the audio signal have been used to calculate features. These include individual short frames (23 ms), lon...
Kris West, Stephen Cox
TCOM
2010
72views more  TCOM 2010»
14 years 8 months ago
Iterative Multisymbol Noncoherent Reception of Coded CPFSK
—A multisymbol noncoherent receiver suitable for coded continuous-phase frequency-shift keying is developed and analyzed. Unlike coherently detected signals, the modulation index...
Matthew C. Valenti, Shi Cheng, Don J. Torrieri