Sciweavers

438 search results - page 34 / 88
» date 2009
Sort
View
90
Voted
IUI
2009
ACM
15 years 5 months ago
A scientific workflow construction command line
Workflows have emerged as a common tool for scientists to express their computational analyses. While there are a multitude of visual data flow editors for workflow construction, ...
Paul T. Groth, Yolanda Gil
GLOBECOM
2009
IEEE
15 years 5 months ago
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
—In this work, we prove that a positive secure degree of freedom is achievable for a large class of real Gaussian channels as long as the channel is not degraded and the channel ...
Xiang He, Aylin Yener
ACL
2009
14 years 8 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim
KDD
2009
ACM
158views Data Mining» more  KDD 2009»
15 years 10 months ago
Feature shaping for linear SVM classifiers
: ? Feature Shaping for Linear SVM Classifiers George Forman, Martin Scholz, Shyamsundar Rajaram HP Laboratories HPL-2009-31R1 text classification machine learning, feature weighti...
George Forman, Martin Scholz, Shyamsundar Rajaram
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
15 years 10 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...