Sciweavers

36 search results - page 7 / 8
» Web-scale knowledge extraction from semi-structured tables
Sort
View
ISI
2008
Springer
13 years 4 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
13
Voted
TELSYS
2002
73views more  TELSYS 2002»
13 years 4 months ago
Avoiding Counting to Infinity in Distance Vector Routing
The Routing Information Protocol (RIP) may introduce misleading routing information into the routing table, due to network topology changes such as link or router failures. This is...
Andreas Schmid, Christoph Steigner
ICIAP
1999
ACM
13 years 9 months ago
SAR Image Processing Using Artificial Intelligence Planning
—In recent times, improvements in imaging technology have made available an incredible array of information in image format. While powerful and sophisticated image processing sof...
Forest Fisher, Steve A. Chien, Edisanter Lo, Ronal...
ICDIM
2010
IEEE
13 years 2 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
TREC
2001
13 years 6 months ago
SiteQ: Engineering High Performance QA System Using Lexico-Semantic Pattern Matching and Shallow NLP
s In TREC-10, we participated in the web track (only ad-hoc task) and the QA track (only main task). In the QA track, our QA system (SiteQ) has general architecture with three proc...
Gary Geunbae Lee, Jungyun Seo, Seungwoo Lee, Hanmi...