Sciweavers

7978 search results - page 1500 / 1596
» Combining shared-coin algorithms
Sort
View
WWW
2009
ACM
15 years 4 months ago
StatSnowball: a statistical approach to extracting entity relationships
Traditional relation extraction methods require pre-specified relations and relation-specific human-tagged examples. Bootstrapping systems significantly reduce the number of tr...
Jun Zhu, Zaiqing Nie, Xiaojiang Liu, Bo Zhang, Ji-...
CCS
2009
ACM
15 years 4 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
EDBT
2009
ACM
208views Database» more  EDBT 2009»
15 years 4 months ago
Flexible and efficient querying and ranking on hyperlinked data sources
There has been an explosion of hyperlinked data in many domains, e.g., the biological Web. Expressive query languages and effective ranking techniques are required to convert this...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
GLOBECOM
2009
IEEE
15 years 4 months ago
Emulation of Optical PIFO Buffers
—With recent advances in optical technology, we are closer to building all-optical routers than ever before. A major problem in this area, however, is the lack of all-optical mem...
Houman Rastegarfar, Monia Ghobadi, Yashar Ganjali
ICASSP
2009
IEEE
15 years 4 months ago
Denoising scheme for realistic digital photos from unknown sources
: © Denoising Scheme for Realistic Digital Photos from Unknown Sources Suk Hwan Lim, Ron Maurer, Pavel Kisilev HP Laboratories HPL-2008-167 No keywords available. This paper targe...
Suk Hwan Lim, Ron Maurer, Pavel Kisilev
« Prev « First page 1500 / 1596 Last » Next »