Sciweavers

1073 search results - page 189 / 215
» An Introduction to Learning Structured Information
Sort
View
SAC
2010
ACM
15 years 4 months ago
Referrer graph: a low-cost web prediction algorithm
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
B. de la Ossa, Ana Pont, Julio Sahuquillo, Jos&eac...
SP
2009
IEEE
15 years 4 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
76
Voted
SEMCO
2007
IEEE
15 years 4 months ago
Unrestricted Coreference: Identifying Entities and Events in OntoNotes
Most research in the field of anaphora or coreference detection has been limited to noun phrase coreference, usually on a restricted set of entities, such as ACE entities. In par...
Sameer S. Pradhan, Lance A. Ramshaw, Ralph M. Weis...
104
Voted
ACCV
2007
Springer
15 years 3 months ago
Converting Thermal Infrared Face Images into Normal Gray-Level Images
In this paper, we address the problem of producing visible spectrum facial images as we normally see by using thermal infrared images. We apply Canonical Correlation Analysis (CCA)...
Mingsong Dou, Chao Zhang, Pengwei Hao, Jun Li
69
Voted
ACSAC
2006
IEEE
15 years 3 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg