Sciweavers

118 search results - page 20 / 24
» Robust Machine Translation Evaluation with Entailment Featur...
Sort
View
176
Voted
JSAC
2010
146views more  JSAC 2010»
14 years 10 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
144
Voted
WACV
2008
IEEE
15 years 10 months ago
Object Categorization Based on Kernel Principal Component Analysis of Visual Words
In recent years, many researchers are studying object categorization problem. It is reported that bag of keypoints approach which is based on local features without topological in...
Kazuhiro Hotta
151
Voted
DL
1999
Springer
187views Digital Library» more  DL 1999»
15 years 8 months ago
KEA: Practical Automatic Keyphrase Extraction
Keyphrases provide semantic metadata that summarize and characterize documents. This paper describes Kea, an algorithm for automatically extracting keyphrases from text. Kea ident...
Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl...
163
Voted
CL
2008
Springer
15 years 3 months ago
Efficient exception handling in Java bytecode-to-C ahead-of-time compiler for embedded systems
One of the most promising approaches to Java acceleration in embedded systems is a bytecode-to-C ahead-of-time compiler (AOTC). It improves the performance of a Java virtual machi...
Dong-Heon Jung, Jong Kuk Park, Sung-Hwan Bae, Jaem...
115
Voted
ECML
1997
Springer
15 years 7 months ago
Global Data Analysis and the Fragmentation Problem in Decision Tree Induction
We investigate an inherent limitation of top-down decision tree induction in which the continuous partitioning of the instance space progressively lessens the statistical support o...
Ricardo Vilalta, Gunnar Blix, Larry A. Rendell