Sciweavers

2084 search results - page 319 / 417
» Knowledge Exploitation from the Web
Sort
View
OSDI
2008
ACM
14 years 9 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
WSDM
2009
ACM
114views Data Mining» more  WSDM 2009»
14 years 4 months ago
Wikipedia pages as entry points for book search
A lot of the world’s knowledge is stored in books, which, as a result of recent mass-digitisation efforts, are increasingly available online. Search engines, such as Google Book...
Marijn Koolen, Gabriella Kazai, Nick Craswell
VLDB
2004
ACM
137views Database» more  VLDB 2004»
14 years 2 months ago
Schema-Free XQuery
The widespread adoption of XML holds out the promise that document structure can be exploited to specify precise database queries. However, the user may have only a limited knowle...
Yunyao Li, Cong Yu, H. V. Jagadish
CSL
2010
Springer
13 years 8 months ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim
WWW
2003
ACM
14 years 10 months ago
Ontology-Based Image Retrieval
The binary form of an image does not tell what the image is about. It is possible to retrieve images from a database using pattern matching techniques, but usually textual descript...
Avril Styrman, Eero Hyvönen, Kim Viljanen, Sa...