Sciweavers

278 search results - page 39 / 56
» Correcting Dependency Annotation Errors
Sort
View
POPL
2007
ACM
14 years 9 months ago
Logic-flow analysis of higher-order programs
This work presents a framework for fusing flow analysis and theorem proving called logic-flow analysis (LFA). The framework itthe reduced product of two abstract interpretations: ...
Matthew Might
PLDI
2000
ACM
14 years 1 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
WSDM
2010
ACM
245views Data Mining» more  WSDM 2010»
14 years 6 months ago
Improving Quality of Training Data for Learning to Rank Using Click-Through Data
In information retrieval, relevance of documents with respect to queries is usually judged by humans, and used in evaluation and/or learning of ranking functions. Previous work ha...
Jingfang Xu, Chuanliang Chen, Gu Xu, Hang Li, Elbi...
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 9 months ago
Performance evaluation for ML sequence detection in ISI channels with Gauss Markov Noise
Inter-symbol interference (ISI) channels with data dependent Gauss Markov noise have been used to model read channels in magnetic recording and other data storage systems. The Vite...
Naveen Kumar, Aditya Ramamoorthy, Murti V. Salapak...
TSP
2008
107views more  TSP 2008»
13 years 8 months ago
On Energy-Based Acoustic Source Localization for Sensor Networks
In this paper, energy-based localization methods for source localization in sensor networks are examined. The focus is on least-squares-based approaches due to a good tradeoff betw...
Chartchai Meesookho, Urbashi Mitra, Shrikanth Nara...