Sciweavers

6104 search results - page 208 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
ACL
2011
14 years 7 months ago
Knowledge-Based Weak Supervision for Information Extraction of Overlapping Relations
Information extraction (IE) holds the promise of generating a large-scale knowledge base from the Web’s natural language text. Knowledge-based weak supervision, using structured...
Raphael Hoffmann, Congle Zhang, Xiao Ling, Luke S....
DBSEC
2007
138views Database» more  DBSEC 2007»
15 years 5 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee
ICDT
2009
ACM
143views Database» more  ICDT 2009»
16 years 4 months ago
Automatic construction of simple artifact-based business processes
Almost all medium- and large-scale businesses rely on electronic workflow systems to manage their business processes. A key challenge is to enable the easy re-use and modification...
Christian Fritz, Richard Hull, Jianwen Su
PODC
2003
ACM
15 years 9 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
IWC
2006
44views more  IWC 2006»
15 years 4 months ago
Goal-based structuring in recommender systems
Recommender systems help people to find information that is interesting to them. However, current recommendation techniques only address the user's short-term and long-term i...
Mark van Setten, Mettina Veenstra, Anton Nijholt, ...