Sciweavers

213 search results - page 3 / 43
» Refining Information Extraction Rules using Data Provenance
Sort
View
SIGMOD
2008
ACM
92views Database» more  SIGMOD 2008»
14 years 5 months ago
Information extraction challenges in managing unstructured data
Over the past few years, we have been trying to build an end-to-end system at Wisconsin to manage unstructured data, using extraction, integration, and user interaction. This pape...
AnHai Doan, Jeffrey F. Naughton, Raghu Ramakrishna...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
13 years 10 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
CVPR
2010
IEEE
13 years 10 months ago
Efficient Joint 2D and 3D Palmprint Matching with Alignment Refinement
Palmprint verification is a relatively new but promising personal authentication technique for its high accuracy and fast matching speed. Two dimensional (2D) palmprint recognitio...
Wei Li, Lei Zhang, david Zhang, Guangming Lu, Jing...
TSE
2008
128views more  TSE 2008»
13 years 5 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
13 years 9 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...