Sciweavers

12459 search results - page 204 / 2492
» cans 2006
Sort
View
ECIR
2006
Springer
15 years 6 months ago
Filtering Obfuscated Email Spam by means of Phonetic String Matching
Rule-based email filters mainly rely on the occurrence of critical words to classify spam messages. However, perceptive obfuscation techniques can be used to elude exact pattern ma...
Valerio Freschi, Andrea Seraghiti, Alessandro Bogl...
ECIR
2006
Springer
15 years 6 months ago
Clustering Sentences for Discovering Events in News Articles
We investigate the use of clustering methods for the task of grouping the text spans in a news article that refer to the same event. We provide evidence that the order in which eve...
Martina Naughton, Nicholas Kushmerick, Joe Carthy
ERSA
2006
114views Hardware» more  ERSA 2006»
15 years 6 months ago
Architectural Support for Runtime 2D Partial Reconfiguration
: Traditional FPGA architectures can potentially allow the dynamic swap in and out of hardware tasks through 2D partial reconfiguration. A segmented bus structure is proposed to be...
Fei Wang, Jack S. N. Jean
FCS
2006
15 years 6 months ago
Speeeding Up Markov Chain Monte Carlo Algorithms
We prove an upper bound on the convergence rate of Markov Chain Monte Carlo (MCMC) algorithms for the important special case when the state space can be aggregated into a smaller ...
Andras Farago
FLAIRS
2006
15 years 6 months ago
Demystify the Messages in the Hugin Architecture for Probabilistic Inference and Its Application
In this paper, we investigate the semantic meaning of the messages passed in the Hugin architecture for probabilistic inference. By utilizing this information, one can avoid passi...
Dan Wu, Karen H. Jin