Sciweavers

4589 search results - page 766 / 918
» A new evaluation measure for information retrieval systems
Sort
View
ISI
2005
Springer
14 years 1 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
CIKM
2010
Springer
13 years 6 months ago
Manifold ranking with sink points for update summarization
Update summarization aims to create a summary over a topic-related multi-document dataset based on the assumption that the user has already read a set of earlier documents of the ...
Pan Du, Jiafeng Guo, Jin Zhang, Xueqi Cheng
ICC
2007
IEEE
145views Communications» more  ICC 2007»
14 years 2 months ago
Click on a Cluster: A Viable Approach to Scale Software-Based Routers
—Extensible software-based routers running on commodity off-the-shelf hardware and open-source operating systems have been motivated by the progress in hardware technologies and ...
Qinghua Ye, Mike H. MacGregor
ANSS
2002
IEEE
14 years 1 months ago
Performance Analysis for Data Service in Third Generation Mobile Telecommunication Networks
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...
Aloizio Pereira da Silva, Geraldo Robson Mateus
CC
2006
Springer
118views System Software» more  CC 2006»
13 years 11 months ago
Lightweight Lexical Closures for Legitimate Execution Stack Access
We propose a new language concept called "L-closures" for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight...
Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa