Sciweavers

6906 search results - page 10 / 1382
» An algorithm for modelling key terms
Sort
View
CCS
2006
ACM
15 years 3 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
SCAM
2006
IEEE
15 years 5 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
SIGIR
2005
ACM
15 years 5 months ago
Using term informativeness for named entity detection
Informal communication (e-mail, bulletin boards) poses a difficult learning environment because traditional grammatical and lexical information are noisy. Other information is nec...
Jason D. M. Rennie, Tommi Jaakkola
LREC
2008
129views Education» more  LREC 2008»
15 years 1 months ago
Chinese Core Ontology Construction from a Bilingual Term Bank
A core ontology is a mid-level ontology which bridges the gap between an upper ontology and a domain ontology. Automatic Chinese core ontology construction can help quickly model ...
Yi-Rong Chen, Qin Lu, Wenjie Li, Gaoying Cui
ICTIR
2009
Springer
15 years 6 months ago
"A term is known by the company it keeps": On Selecting a Good Expansion Set in Pseudo-Relevance Feedback
Abstract. It is well known that pseudo-relevance feedback (PRF) improves the retrieval performance of Information Retrieval (IR) systems in general. However, a recent study by Cao ...
Raghavendra Udupa, Abhijit Bhole, Pushpak Bhattach...