Sciweavers

459 search results - page 23 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
CN
2008
126views more  CN 2008»
13 years 7 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani
ADBIS
2007
Springer
132views Database» more  ADBIS 2007»
14 years 1 months ago
Clustering Approach to Generalized Pattern Identification Based on Multi-instanced Objects with DARA
Clustering is an essential data mining task with various types of applications. Traditional clustering algorithms are based on a vector space model representation. A relational dat...
Rayner Alfred, Dimitar Kazakov
EMNLP
2009
13 years 5 months ago
Unsupervised morphological segmentation and clustering with document boundaries
Many approaches to unsupervised morphology acquisition incorporate the frequency of character sequences with respect to each other to identify word stems and affixes. This typical...
Taesun Moon, Katrin Erk, Jason Baldridge
ITS
2004
Springer
124views Multimedia» more  ITS 2004»
14 years 29 days ago
Combining Competing Language Understanding Approaches in an Intelligent Tutoring System
When implementing a tutoring system that attempts a deep understanding of students’ natural language explanations, there are three basic approaches to choose between; symbolic, i...
Pamela W. Jordan, Maxim Makatchev, Kurt VanLehn
SIGMOD
2005
ACM
138views Database» more  SIGMOD 2005»
14 years 7 months ago
Automatic Physical Database Tuning: A Relaxation-based Approach
In recent years there has been considerable research on automated selection of physical design in database systems. In current solutions, candidate access paths are heuristically ...
Nicolas Bruno, Surajit Chaudhuri