Sciweavers

988 search results - page 54 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ACL
2010
13 years 7 months ago
Distributional Similarity vs. PU Learning for Entity Set Expansion
Distributional similarity is a classic technique for entity set expansion, where the system is given a set of seed entities of a particular class, and is asked to expand the set u...
Xiaoli Li, Lei Zhang, Bing Liu, See-Kiong Ng
SIGIR
2003
ACM
14 years 2 months ago
Query length in interactive information retrieval
Query length in best-match information retrieval (IR) systems is well known to be positively related to effectiveness in the IR task, when measured in experimental, non-interactiv...
Nicholas J. Belkin, Diane Kelly, G. Kim, Ja-Young ...
DAC
2009
ACM
14 years 10 months ago
Spare-cell-aware multilevel analytical placement
Post-silicon validation has recently drawn designers' attention due to its increasing impacts on the VLSI design cycle and cost. One key feature of the post-silicon validatio...
Zhe-Wei Jiang, Meng-Kai Hsu, Yao-Wen Chang, Kai-Yu...
ISBI
2008
IEEE
14 years 9 months ago
Double time-scale image reconstruction of the beating and developing embryonic zebrafish heart
We present a time-lapse collection and reconstruction technique that allows following embryonic heart development at any computationally halted heart contraction state. The centra...
Michael Liebling, Julien Vermot, Scott E. Fraser
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 9 months ago
Approximately detecting duplicates for streaming data using stable bloom filters
Traditional duplicate elimination techniques are not applicable to many data stream applications. In general, precisely eliminating duplicates in an unbounded data stream is not f...
Fan Deng, Davood Rafiei