Sciweavers

606 search results - page 117 / 122
» Answer Diversification for Complex Question Answering on the...
Sort
View
DAWAK
2007
Springer
14 years 2 months ago
Mining Top-K Multidimensional Gradients
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
Ronnie Alves, Orlando Belo, Joel Ribeiro
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
14 years 2 months ago
Screening the parameters affecting heuristic performance
This research screens the tuning parameters of a combinatorial optimization heuristic. Specifically, it presents a Design of Experiments (DOE) approach that uses a Fractional Fac...
Enda Ridge, Daniel Kudenko
ISW
2007
Springer
14 years 2 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
IROS
2006
IEEE
165views Robotics» more  IROS 2006»
14 years 2 months ago
Grounded Situation Models for Robots: Where words and percepts meet
— Our long-term objective is to develop robots that engage in natural language-mediated cooperative tasks with humans. To support this goal, we are developing an amodal represent...
Nikolaos Mavridis, Deb Roy
INFOVIS
2005
IEEE
14 years 2 months ago
The Visual Code Navigator: An Interactive Toolset for Source Code Investigation
We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspective...
Gerard Lommerse, Freek Nossin, Lucian Voinea, Alex...