Sciweavers

706 search results - page 96 / 142
» List Decoding: Algorithms and Applications
Sort
View
CIKM
2007
Springer
14 years 2 months ago
"More like these": growing entity classes from seeds
We present a corpus-based approach to the class expansion task. For a given set of seed entities we use co-occurrence statistics taken from a text collection to define a membersh...
Luís Sarmento, Valentin Jijkoun, Maarten de...
MM
2004
ACM
133views Multimedia» more  MM 2004»
14 years 1 months ago
Intuitive and effective interfaces for WWW image search engines
Web image search engine has become an important tool to organize digital images on the Web. However, most commercial search engines still use a list presentation while little effo...
Zhiwei Li, Xing Xie, Hao Liu, Xiaoou Tang, Mingjin...
NDSS
2008
IEEE
14 years 2 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
VLSISP
2008
173views more  VLSISP 2008»
13 years 7 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
WSDM
2009
ACM
140views Data Mining» more  WSDM 2009»
14 years 2 months ago
Effective latent space graph-based re-ranking model with global consistency
Recently the re-ranking algorithms have been quite popular for web search and data mining. However, one of the issues is that those algorithms treat the content and link informati...
Hongbo Deng, Michael R. Lyu, Irwin King