• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,665
Next 10 →

CineCubes: Cubes As Movie Stars with Little Effort

by Dimitrios Gkesoulis, Panos Vassiliadis
"... In this paper we investigate how we can exploit the existence of a star schema in order to answer user OLAP queries with CineCube movies. Our method, implemented in an actual system, includes the following steps. The user submits a query over an underlying star schema. Taking this query as input, th ..."
Abstract - Add to MetaCart
In this paper we investigate how we can exploit the existence of a star schema in order to answer user OLAP queries with CineCube movies. Our method, implemented in an actual system, includes the following steps. The user submits a query over an underlying star schema. Taking this query as input, the system comes up with a set of queries complementing the information content of the original query, and executes them. Then, the system visualizes the query results and accompanies this presentation with a text commenting on the result highlights. Moreover, via a text-to-speech conversion the system automatically produces audio for the constructed text. Each combination of visualization, text and audio practically constitutes a cube movie, which is wrapped as a PowerPoint presentation and returned to the user.

Approach to construction of automatic morphological analysis systems for inflective languages with little effort

by Alexander Gelbukh, Grigori Sidorov - in Computational Linguistics and Intelligent Text Processing, 4th International Conference, CICLing 2003
"... Abstract. The problem of developing of systems of morphological analysis for inflective languages is known as rather laborious. We suggest the approach for development of these systems that permits to spend less time and effort. It is based on static processing of stem allomorphs and the method of a ..."
Abstract - Cited by 19 (5 self) - Add to MetaCart
on this approach, were developed for Russian and Spanish with relatively little effort and time. 1

Very Fast YACC-Compatible Parsers (For Very Little Effort)

by Achyutram Bhamidipaty, Todd A. Proebsting - Software - Practice & Experience , 1995
"... We have developed a yacc-compatible parser generator that creates parsers that are 2.5 to 6.5 times faster than those generated by yacc or bison. Our tool, mule, creates directly-executable, hard-coded parsers in ANSI C; yacc produces interpreted, tabledriven parsers. Hard-coding LR parsers for spee ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
-coded-parser generators. Mule creates simple, fast parsers after very little analysis. September 22, 1995 Department of Computer Science The University of Arizona Tucson, AZ 1 Introduction We have developed a yacc-compatible parser generator that creates parsers that are 2.5 to 6.5 times faster than those generated

The Cricket Location-Support System

by Nissanka B. Priyantha, Anit Chakraborty, Hari Balakrishnan , 2000
"... This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze informatio ..."
Abstract - Cited by 1058 (11 self) - Add to MetaCart
that improve accuracy. Our experience with Cricket shows that several location-dependent applications such as in-building active maps and device control can be developed with little effort or manual configuration. 1

Survey of clustering algorithms

by Rui Xu, Donald Wunsch II - IEEE TRANSACTIONS ON NEURAL NETWORKS , 2005
"... Data analysis plays an indispensable role for understanding various phenomena. Cluster analysis, primitive exploration with little or no prior knowledge, consists of research developed across a wide variety of communities. The diversity, on one hand, equips us with many tools. On the other hand, the ..."
Abstract - Cited by 499 (4 self) - Add to MetaCart
Data analysis plays an indispensable role for understanding various phenomena. Cluster analysis, primitive exploration with little or no prior knowledge, consists of research developed across a wide variety of communities. The diversity, on one hand, equips us with many tools. On the other hand

MicroRNA genes are transcribed by RNA polymerase II

by Yoontae Lee, Minju Kim, Jinju Han, Kyu-hyun Yeom, Sanghyuk Lee, Sung Hee Baek, V Narry Kim - EMBO J , 2004
"... MicroRNAs (miRNAs) constitute a large family of noncod-ing RNAs that function as guide molecules in diverse gene silencing pathways. Current efforts are focused on the regulatory function of miRNAs, while little is known about how these unusual genes themselves are regulated. Here we present the fir ..."
Abstract - Cited by 491 (8 self) - Add to MetaCart
MicroRNAs (miRNAs) constitute a large family of noncod-ing RNAs that function as guide molecules in diverse gene silencing pathways. Current efforts are focused on the regulatory function of miRNAs, while little is known about how these unusual genes themselves are regulated. Here we present

The inductive approach to verifying cryptographic protocols

by Lawrence C. Paulson - Journal of Computer Security , 1998
"... Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as ..."
Abstract - Cited by 480 (29 self) - Add to MetaCart
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can

Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments

by Gary B. Huang, Manu Ramesh, Tamara Berg, Erik Learned-Miller
"... Face recognition has benefitted greatly from the many databases that have been produced to study it. Most of these databases have been created under controlled conditions to facilitate the study of specific parameters on the face recognition problem. These parameters include such variables as posi ..."
Abstract - Cited by 449 (11 self) - Add to MetaCart
as position, pose, lighting, expression, background, camera quality, occlusion, age, and gender. While there are many applications for face recognition technology in which one can control the parameters of image acquisition, there are also many applications in which the practitioner has little or no control

Measuring user influence in Twitter: The million follower fallacy

by Meeyoung Cha, Hamed Haddadi, Fabrício Benevenuto, Krishna P. Gummadi - in ICWSM ’10: Proceedings of international AAAI Conference on Weblogs and Social , 2010
"... Directed links in social media could represent anything from intimate friendships to common interests, or even a passion for breaking news or celebrity gossip. Such directed links determine the flow of information and hence indicate a user’s influence on others—a concept that is crucial in sociology ..."
Abstract - Cited by 401 (24 self) - Add to MetaCart
, but through concerted effort such as limiting tweets to a single topic. We believe that these findings provide new insights for viral marketing and suggest that topological measures such as indegree alone reveals very little about the influence of a user.

Service-oriented computing

by Michael P. Papazoglou, Paolo Traverso, Schahram Dustdar, Frank Leymann - Communications of the ACM , 2003
"... Service-Oriented Computing (SOC) is a new computing paradigm that utilizes services as the basic constructs to support the development of rapid, low-cost and easy composition of distributed applications even in heterogeneous environments. The visionary promise of Service-Oriented Computing is a worl ..."
Abstract - Cited by 306 (10 self) - Add to MetaCart
world of cooperating services where application components are assembled with little effort into a network of services that can be loosely coupled to create flexible dynamic business processes and agile applications that may span organisations and computing platforms. SOC is being shaped by
Next 10 →
Results 1 - 10 of 7,665
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University