Sciweavers

1687 search results - page 82 / 338
» Which pointer analysis should I use
Sort
View
163
Voted
KDD
2009
ACM
262views Data Mining» more  KDD 2009»
16 years 4 months ago
Sentiment analysis of blogs by combining lexical knowledge with text classification
The explosion of user-generated content on the Web has led to new opportunities and significant challenges for companies, that are increasingly concerned about monitoring the disc...
Prem Melville, Wojciech Gryc, Richard D. Lawrence
125
Voted
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 10 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
ATAL
2008
Springer
15 years 5 months ago
Emotional reading of medical texts using conversational agents
In this paper, we present a prototype that helps visualizing the relative importance of sentences extracted from medical texts using Embodied Conversational Agents (ECA). We propo...
Gersende Georg, Catherine Pelachaud, Marc Cavazza
144
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Fisher Kernels for Handwritten Word-spotting
The Fisher kernel is a generic framework which combines the benefits of generative and discriminative approaches to pattern classification. In this contribution, we propose to a...
Florent Perronnin, José A. Rodríguez...
EUROPAR
2007
Springer
15 years 10 months ago
Delayed Side-Effects Ease Multi-core Programming
Computer systems are increasingly parallel and heterogeneous, while programs are still largely written in sequential languages. The obvious suggestion that the compiler should auto...
Anton Lokhmotov, Alan Mycroft, Andrew Richards