Sciweavers

739 search results - page 39 / 148
» Resources for Evaluation of Summarization Techniques
Sort
View
TRECVID
2008
13 years 10 months ago
Tokyo Tech at TRECVID 2008
The Tokyo Institute of Technology team participated in the high-level feature extraction, surveillance event detection pilot and Rushes summarization tasks for TRECVID2008. In the...
Shanshan Hao, Yusuke Yoshizawa, Koji Yamasaki, Koi...
SIGCOMM
2010
ACM
13 years 8 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
ICEIS
2003
IEEE
14 years 1 months ago
Live-Representation Process Management
Abstract: We present the live-representation approach for managing and working in complex, dynamic business processes. In this approach, aspects of business-process modeling, proje...
Daniel D. Corkill, Zachary B. Rubinstein, Susan E....
INTERSPEECH
2010
13 years 3 months ago
Verifying pronunciation dictionaries using conflict analysis
We describe a new language-independent technique for automatically identifying errors in an electronic pronunciation dictionary by analyzing the source of conflicting patterns dir...
Marelie H. Davel, Febe de Wet
DSRT
2008
IEEE
13 years 10 months ago
Evaluating Large Scale Distributed Simulation of P2P Networks
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...