Sciweavers

731 search results - page 126 / 147
» Active Hidden Markov Models for Information Extraction
Sort
View
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
15 years 11 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
ACL
2008
14 years 11 months ago
Sentence Simplification for Semantic Role Labeling
Parse-tree paths are commonly used to incorporate information from syntactic parses into NLP systems. These systems typically treat the paths as atomic (or nearly atomic) features...
David Vickrey, Daphne Koller
KDD
2008
ACM
159views Data Mining» more  KDD 2008»
15 years 10 months ago
Semi-supervised learning with data calibration for long-term time series forecasting
Many time series prediction methods have focused on single step or short term prediction problems due to the inherent difficulty in controlling the propagation of errors from one ...
Haibin Cheng, Pang-Ning Tan
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
WISEC
2010
ACM
15 years 4 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...