Sciweavers

7839 search results - page 1439 / 1568
» What's there and what's not
Sort
View
IMC
2007
ACM
15 years 2 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
APPROX
2010
Springer
179views Algorithms» more  APPROX 2010»
15 years 2 months ago
Rumor Spreading on Random Regular Graphs and Expanders
Broadcasting algorithms are important building blocks of distributed systems. In this work we investigate the typical performance of the classical and well-studied push model. Assu...
Nikolaos Fountoulakis, Konstantinos Panagiotou
ACL
2008
15 years 2 months ago
The Tradeoffs Between Open and Traditional Relation Extraction
Traditional Information Extraction (IE) takes a relation name and hand-tagged examples of that relation as input. Open IE is a relationindependent extraction paradigm that is tail...
Michele Banko, Oren Etzioni
115
Voted
AAAI
2010
15 years 2 months ago
Collaborative Filtering Meets Mobile Recommendation: A User-Centered Approach
With the increasing popularity of location tracking services such as GPS, more and more mobile data are being accumulated. Based on such data, a potentially useful service is to m...
Vincent Wenchen Zheng, Bin Cao, Yu Zheng, Xing Xie...
ACL
2008
15 years 2 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
« Prev « First page 1439 / 1568 Last » Next »