Sciweavers

832 search results - page 104 / 167
» Effect of Malicious Synchronization
Sort
View
DBISP2P
2008
Springer
124views Database» more  DBISP2P 2008»
13 years 11 months ago
Exploiting Distribution Skew for Scalable P2P Text Clustering
K-Means clustering is widely used in information retrieval and data mining. Distributed K-Means variants have already been proposed, but none of the past algorithms scales to large...
Odysseas Papapetrou, Wolf Siberski, Fabian Leitrit...
EMNLP
2008
13 years 11 months ago
Generalizing Local and Non-Local Word-Reordering Patterns for Syntax-Based Machine Translation
Syntactic word reordering is essential for translations across different grammar structures between syntactically distant languagepairs. In this paper, we propose to embed local a...
Bing Zhao, Yaser Al-Onaizan
FMOODS
2007
13 years 11 months ago
Asynchronous Session Types and Progress for Object Oriented Languages
Abstract. A session type is an abstraction of a sequence of heterogeneous values sent over one channel between two communicating processes. Session types have been introduced to gu...
Mario Coppo, Mariangiola Dezani-Ciancaglini, Nobuk...
ACST
2006
13 years 11 months ago
Experimental study of hybrid-type distributed maximal constraint satisfaction algorithm
A constraint satisfaction problem (CSP) is a general framework that can formalize various application problems in artificial intelligence. However, practical real-world problems t...
Masato Noto, Masahito Kurihara
DATESO
2006
109views Database» more  DATESO 2006»
13 years 11 months ago
Compression of a Dictionary
Some text compression methods take advantage from using more complex compression units than characters. The synchronization between coder and decoder then can be done by transferri...
Jan Lansky, Michal Zemlicka