Sciweavers

620 search results - page 92 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
CEAS
2007
Springer
15 years 8 months ago
Learning Fast Classifiers for Image Spam
Recently, spammers have proliferated "image spam", emails which contain the text of the spam message in a human readable image instead of the message body, making detect...
Mark Dredze, Reuven Gevaryahu, Ari Elias-Bachrach
VTC
2010
IEEE
127views Communications» more  VTC 2010»
15 years 2 months ago
Inter-Site Joint Detection with Reduced Backhaul Capacity Requirements for the 3GPP LTE Uplink
—Cellular networks operating with a frequency reuse factor of one are often interference-limited. For that reason, base station (BS) cooperation techniques aiming at mitigating t...
Philipp Frank, Andreas Müller, Joachim Speide...
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 8 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
INTERACT
2007
15 years 5 months ago
ThumbSpace: Generalized One-Handed Input for Touchscreen-Based Mobile Devices
In this paper, we present ThumbSpace, a software-based interaction technique that provides general one-handed thumb operation of touchscreenbased mobile devices. Our goals are to p...
Amy K. Karlson, Benjamin B. Bederson
RE
2010
Springer
15 years 2 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...