Sciweavers

3895 search results - page 176 / 779
» Measuring the effectiveness of ACATS
Sort
View
CIKM
2008
Springer
15 years 6 months ago
Achieving both high precision and high recall in near-duplicate detection
To find near-duplicate documents, fingerprint-based paradigms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches a...
Lian'en Huang, Lei Wang, Xiaoming Li
WSC
1997
15 years 6 months ago
Selective Rerouting Using Simulated Steady State System Data
Effective operational control of a manufacturing system that has routing flexibility is dependent upon being able to make informed real-time decisions in the event of a system dis...
Catherine M. Harmonosky, Robert H. Farr, Ming-Chua...
JASIS
2010
262views more  JASIS 2010»
15 years 3 months ago
New event detection and topic tracking in Turkish
Topic detection and tracking (TDT) applications aim to organize the temporally ordered stories of a news stream according to the events. Two major problems in TDT are new event de...
Fazli Can, Seyit Kocberber, Ozgur Baglioglu, Suley...
ISQED
2003
IEEE
71views Hardware» more  ISQED 2003»
15 years 10 months ago
Revisiting the Noise Figure Design Metric for Digital Communication Receiver
Noise figure is a commonly used system parameter that quantifies the degradation in the signal-to-noise ratio (SNR) as the signal passes through a receiving system. Because of the...
Won Namgoong, Jongrit Lerdworatawee
SIGMETRICS
2008
ACM
101views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
How to parameterize models with bursty workloads
Although recent advances in theory indicate that burstiness in the service time process can be handled effectively by queueing models (e.g., MAP queueing networks [2]), there is a...
Giuliano Casale, Ningfang Mi, Ludmila Cherkasova, ...