Sciweavers

11588 search results - page 2263 / 2318
» Will They Like This
Sort
View
EMNLP
2010
13 years 7 months ago
Improving Mention Detection Robustness to Noisy Input
Information-extraction (IE) research typically focuses on clean-text inputs. However, an IE engine serving real applications yields many false alarms due to less-well-formed input...
Radu Florian, John F. Pitrelli, Salim Roukos, Imed...
FPL
2010
Springer
108views Hardware» more  FPL 2010»
13 years 7 months ago
FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns
The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. Th...
Faisal Khan, Maya Gokhale, Chen-Nee Chuah
GLOBECOM
2010
IEEE
13 years 7 months ago
Efficient Uplink Bandwidth Utilization in P2P-TV Streaming Systems
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and they are becoming popular among users as well. P2P-TV systems target the real time...
Alessandra Carta, Marco Mellia, Michela Meo, Stefa...
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
13 years 7 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
ICSE
2010
IEEE-ACM
13 years 7 months ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan
« Prev « First page 2263 / 2318 Last » Next »