Sciweavers

739 search results - page 124 / 148
» Resources for Evaluation of Summarization Techniques
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
EUROPAR
2009
Springer
13 years 6 months ago
A Least-Resistance Path in Reasoning about Unstructured Overlay Networks
Unstructured overlay networks for peer-to-peer applications combined with stochastic algorithms for clustering and resource location are attractive due to low-maintenance costs and...
Giorgos Georgiadis, Marina Papatriantafilou
CIKM
2010
Springer
13 years 5 months ago
Crawling the web for structured documents
Structured Information Retrieval is gaining a lot of interest in recent years, as this kind of information is becoming an invaluable asset for professional communities such as Sof...
Julián Urbano, Juan Loréns, Yorgos A...
WWW
2011
ACM
13 years 3 months ago
Unsupervised query segmentation using only query logs
We introduce an unsupervised query segmentation scheme that uses query logs as the only resource and can effectively capture the structural units in queries. We believe that Web s...
Nikita Mishra, Rishiraj Saha Roy, Niloy Ganguly, S...
TWC
2010
13 years 3 months ago
Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel
In this paper we propose a Dynamic Spectrum Access scheme which allows the users to opportunistically and efficiently access the channels available for communications. It addresses...
Nicola Baldo, Alfred Asterjadhi, Michele Zorzi