Sciweavers

911 search results - page 44 / 183
» Combining programs and state machines
Sort
View
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 8 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
PLDI
2011
ACM
12 years 11 months ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...
ACL
2006
13 years 10 months ago
Re-Usable Tools for Precision Machine Translation
The LOGON MT demonstrator assembles independently valuable general-purpose NLP components into a machine translation pipeline that capitalizes on output quality. The demonstrator ...
Jan Tore Lønning, Stephan Oepen
POS
1998
Springer
14 years 27 days ago
Straightforward Java Persistence Through Checkpointing
Several techniques have been proposed for adding persistence to the Java language environment. This paper describes a system we call icee that works by checkpointing the Java Virt...
Jon Howell
STOC
2006
ACM
149views Algorithms» more  STOC 2006»
14 years 9 months ago
Bounded-error quantum state identification and exponential separations in communication complexity
We consider the problem of bounded-error quantum state identification: given either state 0 or state 1, we are required to output `0', `1' or `?' ("don't ...
Dmitry Gavinsky, Julia Kempe, Oded Regev, Ronald d...