Sciweavers

696 search results - page 120 / 140
» A class of combinatorial identities
Sort
View
ACL
2008
15 years 3 months ago
Exploiting Feature Hierarchy for Transfer Learning in Named Entity Recognition
We present a novel hierarchical prior structure for supervised transfer learning in named entity recognition, motivated by the common structure of feature spaces for this task acr...
Andrew Arnold, Ramesh Nallapati, William W. Cohen
FAST
2007
15 years 3 months ago
Strong Accountability for Network Storage
This paper presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. A CATS server annotates read and write res...
Aydan R. Yumerefendi, Jeffrey S. Chase
IMF
2007
15 years 3 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
NIPS
2007
15 years 3 months ago
Stability Bounds for Non-i.i.d. Processes
The notion of algorithmic stability has been used effectively in the past to derive tight generalization bounds. A key advantage of these bounds is that they are designed for spec...
Mehryar Mohri, Afshin Rostamizadeh
BDA
2004
15 years 3 months ago
Indexing XML Objects with Ordered Schema Trees
: XML DBMSs require new indexing techniques to efficiently process structural search and full-text search as integrated in XQuery. Much research has been done for indexing XML docu...
Laurent Yeh, Georges Gardarin