Sciweavers

213 search results - page 41 / 43
» Refining Information Extraction Rules using Data Provenance
Sort
View
NPL
2006
85views more  NPL 2006»
13 years 5 months ago
A Neural Model for Context-dependent Sequence Learning
A novel neural network model is described that implements context-dependent learning of complex sequences. The model utilises leaky integrate-and-fire neurons to extract timing inf...
Luc Berthouze, Adriaan G. Tijsseling
EMNLP
2007
13 years 7 months ago
Syntactic Re-Alignment Models for Machine Translation
We present a method for improving word alignment for statistical syntax-based machine translation that employs a syntactically informed alignment model closer to the translation m...
Jonathan May, Kevin Knight
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 9 days ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
BMCBI
2005
102views more  BMCBI 2005»
13 years 5 months ago
BioCreAtIvE Task1A: entity identification with a stochastic tagger
Background: Our approach to Task 1A was inspired by Tanabe and Wilbur's ABGene system [1,2]. Like Tanabe and Wilbur, we approached the problem as one of part-of-speech taggin...
Shuhei Kinoshita, K. Bretonnel Cohen, Philip V. Og...
ECOOP
1999
Springer
13 years 10 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky