Sciweavers

1180 search results - page 236 / 236
» Total Functional Software Engineering - Overview Paper
Sort
View
CCS
2010
ACM
13 years 2 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
WWW
2011
ACM
13 years 5 days ago
A self-training approach for resolving object coreference on the semantic web
An object on the Semantic Web is likely to be denoted with multiple URIs by different parties. Object coreference resolution is to identify “equivalent” URIs that denote the ...
Wei Hu, Jianfeng Chen, Yuzhong Qu
TASLP
2010
105views more  TASLP 2010»
12 years 12 months ago
Non-Negative Tensor Factorization Applied to Music Genre Classification
Music genre classification techniques are typically applied to the data matrix whose columns are the feature vectors extracted from music recordings. In this paper, a feature vecto...
Emmanouil Benetos, Constantine Kotropoulos
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
11 years 7 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
AAAI
2007
13 years 7 months ago
Learning by Reading: A Prototype System, Performance Baseline and Lessons Learned
A traditional goal of Artificial Intelligence research has been a system that can read unrestricted natural language texts on a given topic, build a model of that topic and reason...
Ken Barker, Bhalchandra Agashe, Shaw Yi Chaw, Jame...