Sciweavers

118 search results - page 20 / 24
» Robust Machine Translation Evaluation with Entailment Featur...
Sort
View
JSAC
2010
146views more  JSAC 2010»
13 years 2 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
WACV
2008
IEEE
14 years 2 months ago
Object Categorization Based on Kernel Principal Component Analysis of Visual Words
In recent years, many researchers are studying object categorization problem. It is reported that bag of keypoints approach which is based on local features without topological in...
Kazuhiro Hotta
DL
1999
Springer
187views Digital Library» more  DL 1999»
13 years 12 months ago
KEA: Practical Automatic Keyphrase Extraction
Keyphrases provide semantic metadata that summarize and characterize documents. This paper describes Kea, an algorithm for automatically extracting keyphrases from text. Kea ident...
Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl...
CL
2008
Springer
13 years 7 months ago
Efficient exception handling in Java bytecode-to-C ahead-of-time compiler for embedded systems
One of the most promising approaches to Java acceleration in embedded systems is a bytecode-to-C ahead-of-time compiler (AOTC). It improves the performance of a Java virtual machi...
Dong-Heon Jung, Jong Kuk Park, Sung-Hwan Bae, Jaem...
ECML
1997
Springer
13 years 12 months ago
Global Data Analysis and the Fragmentation Problem in Decision Tree Induction
We investigate an inherent limitation of top-down decision tree induction in which the continuous partitioning of the instance space progressively lessens the statistical support o...
Ricardo Vilalta, Gunnar Blix, Larry A. Rendell