Sciweavers

35 search results - page 6 / 7
» A Maximum Entropy Approach to Identifying Sentence Boundarie...
Sort
View
CSFW
2007
IEEE
14 years 17 days ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JCS
2008
93views more  JCS 2008»
13 years 6 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
BMCBI
2005
134views more  BMCBI 2005»
13 years 6 months ago
Systematic feature evaluation for gene name recognition
In task 1A of the BioCreAtIvE evaluation, systems had to be devised that recognize words and phrases forming gene or protein names in natural language sentences. We approach this ...
Jörg Hakenberg, Steffen Bickel, Conrad Plake,...
ICML
2007
IEEE
14 years 7 months ago
Cluster analysis of heterogeneous rank data
Cluster analysis of ranking data, which occurs in consumer questionnaires, voting forms or other inquiries of preferences, attempts to identify typical groups of rank choices. Emp...
Ludwig M. Busse, Peter Orbanz, Joachim M. Buhmann
ICASSP
2008
IEEE
14 years 20 days ago
Modeling the intonation of discourse segments for improved online dialog ACT tagging
Prosody is an important cue for identifying dialog acts. In this paper, we show that modeling the sequence of acousticprosodic values as n-gram features with a maximum entropy mod...
Vivek Kumar Rangarajan Sridhar, Shrikanth Narayana...