Search Results

Channel Assignment in an IEEE 802.11 WLAN Based on Signal-to-Interference Ratio
This article discusses channel assignment in an IEEE 802.11 WLAN based on signal-to-interference ratio.
Self-Configuring Wireless MEMS Network
This presentation discusses miniature, lightweight, self-powered wireless sensors, and networking software needs.
A Bootstrapping Method for Building Subjectivity Lexicons for Languages with Scarce Resources
This article discusses a bootstrapping method for building subjectivity lexicons for languages with scarce resources.
BABYLON Parallel Text Builder: Gathering Parallel Texts for Low-Density Languages
This paper discusses BABYLON parallel text builder.
Learning to Identify Emotions in Text
This paper discusses learning to identify emotions in text.
Automatic Keyword Extraction for Learning Object Repositories
This article discusses automatic keyword extraction for learning object repositories.
Linguistically Motivated Features for Enhanced Back-of-the-Book Indexing
This paper discusses linguistically motivated features for enhanced back-of-the-book indexing.
Networks and Natural Language Processing
Article discussing networks and natural language processing. The authors present some of the most successful graph-based representations and algorithms used in language processing and try to explain how and why they work.
[Review] The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data
This article reviews the book "'The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data," by Ronen Feldman and James Sanger.
Multilingual Subjectivity Analysis Using Machine Translation
This paper discusses multilingual subjectivity analysis using machine translation.
Transformational Paradigm for Engineering and Engineering Technology Education
This paper discusses a transformational paradigm for engineering and engineering technology education at the baccalaureate level.
Framework for Design Validation of Security Architectures
This technical report discusses a framework for design validation of security architectures.
Dynamic intimate contact social networks and epidemic interventions
This article discusses dynamic intimate contact social networks and epidemic interventions.
Relating Boolean Gate Truth Tables to One-Way Functions
In this paper, the authors present a schema to build one way functions from a family of Boolean gates. Moreover, the authors relate characteristics of these Boolean gate truth tables to properties of the derived one-way functions.
Classification Errors in a Domain-Independent Assessment System
This paper presents a domain-independent technique for assessing learners' constructed responses.
Extracting a Representation from Text for Semantic Analysis
This paper presents a novel fine-grained semantic representation of text and an approach to constructing it.
Adaptive Control Optimization of Cutting Parameters for High Quality Machining Operations based on Neural Networks and Search Algorithms
This book chapter presents an Adaptive Control with Optimization (ACO) system for optimising a multi-objective function based on material removal rate, quality loss function related to surface roughness, and cutting-tool life subjected to surface roughness specifications constraint.
Probing Noise in Flux Qubits via Macroscopic Resonant Tunneling
Article on the characterization of noise in a flux qubit using macroscopic resonant tunneling between the two lowest lying states of a bistable rf SQUID. Analysis of these results indicates that the dominant source of low energy flux noise in this device is a quantum mechanical environment in thermal equilibrium.
Back to Top of Screen