Sciweavers

CIDR
2009
141views Algorithms» more  CIDR 2009»
13 years 7 months ago
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence
The Web has enabled the availability of a huge amount of useful information, but has also eased the ability to spread false information and rumors across multiple sources, making ...
Laure Berti-Equille, Anish Das Sarma, Xin Dong, Am...
IJCAI
2003
13 years 7 months ago
Intelligent Multimedia Indexing and Retrieval through Multi-source Information Extraction and Merging
This paper reports work on automated meta-data creation for multimedia content. The approach results in the generation of a conceptual index of the content which may then be searc...
Jan Kuper, Horacio Saggion, Hamish Cunningham, Thi...
PDPTA
2007
13 years 7 months ago
Scheduling Divisible Workloads from Multiple Sources in Linear Daisy Chain Networks
— This paper considers scheduling divisible workloads from multiple sources in linear networks of processors. We propose a two phase scheduling strategy (TPSS) to minimize the ov...
Xinxin Liu, Han Zhao, Xiaolin Li
LREC
2008
132views Education» more  LREC 2008»
13 years 7 months ago
Finding the Sources and Targets of Subjective Expressions
As many popular text genres such as blogs or news contain opinions by multiple sources and about multiple targets, finding the sources and targets of subjective expressions become...
Josef Ruppenhofer, Swapna Somasundaran, Janyce Wie...
HICSS
1997
IEEE
75views Biometrics» more  HICSS 1997»
13 years 10 months ago
The Voting-Type Technique in the Refinement of Multiple Expert Knowledge
The goal of this paper is to develop methods to handle inconsistent knowledge elicited from multiple sources. Knowledge is represented using predicates that define relationships w...
Seppo Puuronen, Vagan Y. Terziyan
ISCC
2003
IEEE
13 years 11 months ago
DCMC - Delay-Constrained Multipoint Communication with Multiple Sources
Multipoint communication — simultaneous transmission from multiple sources to a group of receivers — has numerous applications on Internet. However, the problem is mainly stud...
Ayse Karaman, Hossam S. Hassanein
CIKM
2005
Springer
13 years 11 months ago
Query expansion using random walk models
It has long been recognized that capturing term relationships is an important aspect of information retrieval. Even with large amounts of data, we usually only have significant ev...
Kevyn Collins-Thompson, Jamie Callan
ASWEC
2007
IEEE
14 years 18 days ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
ICDM
2009
IEEE
117views Data Mining» more  ICDM 2009»
14 years 27 days ago
Clustering with Multiple Graphs
—In graph-based learning models, entities are often represented as vertices in an undirected graph with weighted edges describing the relationships between entities. In many real...
Wei Tang, Zhengdong Lu, Inderjit S. Dhillon
DCC
2010
IEEE
14 years 1 months ago
The Non-existence of Length-5 Perfect Slepian-Wolf Codes of Three Sources
—We consider Slepian-Wolf coding of multiple sources and extend the packing bound and the notion of perfect code from conventional channel coding to SW coding with more than two ...
Samuel Cheng, Rick Ma