Sciweavers

2038 search results - page 107 / 408
» Loops under Strategies
Sort
View
LREC
2010
309views Education» more  LREC 2010»
15 years 5 months ago
Comment Extraction from Blog Posts and Its Applications to Opinion Mining
Blog posts containing many personal experiences or perspectives toward specific subjects are useful. Blogs allow readers to interact with bloggers by placing comments on specific ...
Huan-An Kao, Hsin-Hsi Chen
CIKM
2011
Springer
14 years 4 months ago
Toward interactive training and evaluation
Machine learning often relies on costly labeled data, and this impedes its application to new classification and information extraction problems. This has motivated the developme...
Gregory Druck, Andrew McCallum
CAV
2010
Springer
225views Hardware» more  CAV 2010»
15 years 7 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
ICCAD
2008
IEEE
97views Hardware» more  ICCAD 2008»
16 years 28 days ago
Integrated code and data placement in two-dimensional mesh based chip multiprocessors
— As transistor sizes continue to shrink and the number of transistors per chip keeps increasing, chip multiprocessors (CMPs) are becoming a promising alternative to remain on th...
Taylan Yemliha, Shekhar Srikantaiah, Mahmut T. Kan...
ECUMN
2007
Springer
15 years 10 months ago
Path Computation for Incoming Interface Multipath Routing
— Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...