Sciweavers

6906 search results - page 10 / 1382
» An algorithm for modelling key terms
Sort
View
CCS
2006
ACM
15 years 1 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
SCAM
2006
IEEE
15 years 3 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
67
Voted
SIGIR
2005
ACM
15 years 3 months ago
Using term informativeness for named entity detection
Informal communication (e-mail, bulletin boards) poses a difficult learning environment because traditional grammatical and lexical information are noisy. Other information is nec...
Jason D. M. Rennie, Tommi Jaakkola
75
Voted
LREC
2008
129views Education» more  LREC 2008»
14 years 11 months ago
Chinese Core Ontology Construction from a Bilingual Term Bank
A core ontology is a mid-level ontology which bridges the gap between an upper ontology and a domain ontology. Automatic Chinese core ontology construction can help quickly model ...
Yi-Rong Chen, Qin Lu, Wenjie Li, Gaoying Cui
ICTIR
2009
Springer
15 years 4 months ago
"A term is known by the company it keeps": On Selecting a Good Expansion Set in Pseudo-Relevance Feedback
Abstract. It is well known that pseudo-relevance feedback (PRF) improves the retrieval performance of Information Retrieval (IR) systems in general. However, a recent study by Cao ...
Raghavendra Udupa, Abhijit Bhole, Pushpak Bhattach...