Sciweavers

2835 search results - page 144 / 567
» Automatic Question Answering
Sort
View
FGCS
2000
104views more  FGCS 2000»
15 years 4 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
SEMWEB
2009
Springer
15 years 10 months ago
Populating the Semantic Web by Macro-reading Internet Text
A key question regarding the future of the semantic web is “how will we acquire structured information to populate the semantic web on a vast scale?” One approach is to enter t...
Tom M. Mitchell, Justin Betteridge, Andrew Carlson...
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
15 years 10 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
WWW
2004
ACM
16 years 5 months ago
Unsupervised learning of soft patterns for generating definitions from online news
Breaking news often contains timely definitions and descriptions of current terms, organizations and personalities. We utilize such web sources to construct definitions for such t...
Hang Cui, Min-Yen Kan, Tat-Seng Chua
ICALP
2009
Springer
16 years 4 months ago
Universal Succinct Representations of Trees?
Abstract. We consider the succinct representation of ordinal and cardinal trees on the RAM with logarithmic word size. Given a tree T, our representations support the following ope...
Arash Farzan, Rajeev Raman, S. Srinivasa Rao