Sciweavers

4127 search results - page 699 / 826
» Evaluation methods for topic models
Sort
View
CONSTRAINTS
2006
115views more  CONSTRAINTS 2006»
15 years 4 months ago
A Cost-Regular Based Hybrid Column Generation Approach
Abstract. Constraint Programming (CP) offers a rich modeling language of constraints embedding efficient algorithms to handle complex and heterogeneous combinatorial problems. To s...
Sophie Demassey, Gilles Pesant, Louis-Martin Rouss...
IJAR
2008
167views more  IJAR 2008»
15 years 4 months ago
Approximate algorithms for credal networks with binary variables
This paper presents a family of algorithms for approximate inference in credal networks (that is, models based on directed acyclic graphs and set-valued probabilities) that contai...
Jaime Shinsuke Ide, Fabio Gagliardi Cozman
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
JSA
2006
86views more  JSA 2006»
15 years 4 months ago
The design and utility of the ML-RSIM system simulator
Execution-driven simulation has become the primary method for evaluating architectural techniques as it facilitates rapid design space exploration without the cost of building pro...
Lambert Schaelicke, Michael Parker
TASLP
2008
149views more  TASLP 2008»
15 years 4 months ago
Using Articulatory Representations to Detect Segmental Errors in Nonnative Pronunciation
Abstract--Motivated by potential applications in second-language pedagogy, we present a novel approach to using articulatory information to improve automatic detection of typical p...
Joseph Tepperman, Shrikanth Narayanan