Sciweavers

620 search results - page 92 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
CEAS
2007
Springer
13 years 11 months ago
Learning Fast Classifiers for Image Spam
Recently, spammers have proliferated "image spam", emails which contain the text of the spam message in a human readable image instead of the message body, making detect...
Mark Dredze, Reuven Gevaryahu, Ari Elias-Bachrach
VTC
2010
IEEE
127views Communications» more  VTC 2010»
13 years 5 months ago
Inter-Site Joint Detection with Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
Philipp Frank, Andreas Müller, Joachim Speide...
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
13 years 11 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
INTERACT
2007
13 years 8 months ago
ThumbSpace: Generalized One-Handed Input for Touchscreen-Based Mobile Devices
In this paper, we present ThumbSpace, a software-based interaction technique that provides general one-handed thumb operation of touchscreenbased mobile devices. Our goals are to p...
Amy K. Karlson, Benjamin B. Bederson
RE
2010
Springer
13 years 5 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...