Sciweavers

146 search results - page 26 / 30
» A machine learning approach for indonesian question answerin...
Sort
View
MLMI
2005
Springer
14 years 1 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
SIGIR
2008
ACM
13 years 7 months ago
Novelty and diversity in information retrieval evaluation
Evaluation measures act as objective functions to be optimized by information retrieval systems. Such objective functions must accurately reflect user requirements, particularly w...
Charles L. A. Clarke, Maheedhar Kolla, Gordon V. C...
CIKM
1997
Springer
13 years 12 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
KBS
2000
122views more  KBS 2000»
13 years 7 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
TACAS
2005
Springer
108views Algorithms» more  TACAS 2005»
14 years 1 months ago
On Some Transformation Invariants Under Retiming and Resynthesis
Transformations using retiming and resynthesis operations are the most important and practical (if not the only) techniques used in optimizing synchronous hardware systems. Althoug...
Jie-Hong Roland Jiang