Sciweavers

93 search results - page 15 / 19
» Generating Referring Expressions: Making Referents Easy to I...
Sort
View
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 29 days ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
BMCBI
2011
13 years 2 months ago
CNV-WebStore: Online CNV Analysis, Storage and Interpretation
Background: Microarray technology allows the analysis of genomic aberrations at an ever increasing resolution, making functional interpretation of these vast amounts of data the m...
Geert Vandeweyer, Edwin Reyniers, Wim Wuyts, Liesb...
CCO
2001
Springer
161views Combinatorics» more  CCO 2001»
14 years 3 days ago
Branch, Cut, and Price: Sequential and Parallel
Branch, cut, and price (BCP) is an LP-based branch and bound technique for solving large-scale discrete optimization problems (DOPs). In BCP, both cuts and variables can be generat...
Laszlo Ladányi, Ted K. Ralphs, Leslie E. Tr...
CGF
2010
111views more  CGF 2010»
13 years 7 months ago
Density-based Outlier Rejection in Monte Carlo Rendering
The problem of noise in Monte-Carlo rendering arising from estimator variance is well-known and well-studied. In this work, we concentrate on identifying individual light paths as...
Christopher DeCoro, Tim Weyrich, Szymon Rusinkiewi...
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
13 years 12 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...