Sciweavers

216 search results - page 31 / 44
» Explaining User Errors in Knowledge Base Completion
Sort
View
SIAMSC
2010
132views more  SIAMSC 2010»
13 years 7 months ago
New Algorithms for Optimal Online Checkpointing
Frequently, the computation of derivatives for optimizing time-dependent problems is based on the integration of the adjoint differential equation. For this purpose, the knowledge...
Philipp Stumm, Andrea Walther
ICSE
1999
IEEE-ACM
14 years 1 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
GRAPHICSINTERFACE
2007
13 years 10 months ago
TwoStick: writing with a game controller
We report the design and evaluation of a novel game controller text entry method called TwoStick. The design is based on the review of previous work and several rounds of pilot te...
Thomas Költringer, Poika Isokoski, Thomas Gre...
HICSS
2003
IEEE
171views Biometrics» more  HICSS 2003»
14 years 2 months ago
Improving the Efficiency of Interactive Sequential Pattern Mining by Incremental Pattern Discovery
The discovery of sequential patterns, which extends beyond frequent item-set finding of association rule mining, has become a challenging task due to its complexity. Essentially, ...
Ming-Yen Lin, Suh-Yin Lee
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 3 months ago
Design Linear Multiuser Transmitters from Linear Multiuser Receivers
— Novel concepts are introduced for finding the relationship between multiuser detection (MUD) and multiuser transmission (MUT), so that the study in MUT can benefit from the w...
Lie-Liang Yang