Sciweavers

2526 search results - page 334 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
KES
2007
Springer
15 years 10 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
INFOCOM
2006
IEEE
15 years 10 months ago
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— The capacity problem in wireless mesh networks can be alleviated by equipping the mesh routers with multiple radios tuned to non-overlapping channels. However, channel assignme...
Krishna N. Ramachandran, Elizabeth M. Belding-Roye...
SIGIR
2005
ACM
15 years 9 months ago
Using query term order for result summarisation
We report on two experiments performed to test the importance of Term Order in automatic summarisation. Experiment one was undertaken as part of DUC 2004 to which three systems we...
Shao Fen Liang, Siobhan Devlin, John Tait
SIGIR
2005
ACM
15 years 9 months ago
A phonotactic-semantic paradigm for automatic spoken document classification
We demonstrate a phonotactic-semantic paradigm for spoken document categorization. In this framework, we define a set of acoustic words instead of lexical words to represent acous...
Bin Ma, Haizhou Li
STORAGESS
2005
ACM
15 years 9 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough