Sciweavers

1518 search results - page 178 / 304
» Cryptographic Test Correction
Sort
View
JCP
2008
121views more  JCP 2008»
15 years 23 days ago
Algorithms for Identifying the Multiple Syntactic Categories and Meanings of the Word Over
The word over, among others, is associated with a great variety of syntactic categories and meanings. Although over has received attention from scholars in different frameworks for...
Yukiko Sasaki Alam
126
Voted
JDCTA
2008
535views more  JDCTA 2008»
15 years 23 days ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
ECCC
2007
88views more  ECCC 2007»
15 years 22 days ago
Combinatorial Construction of Locally Testable Codes
An error correcting code is said to be locally testable if there is a test that checks whether a given string is a codeword, or rather far from the code, by reading only a constan...
Or Meir
NAR
2006
164views more  NAR 2006»
15 years 22 days ago
FISH - family identification of sequence homologues using structure anchored hidden Markov models
The FISH server is highly accurate in identifying the family membership of domains in a query protein sequence, even in the case of very low sequence identities to known homologue...
Jeanette Tångrot, Lixiao Wang, Bo Kågs...
72
Voted
COLING
2002
15 years 18 days ago
Named Entity Recognition: A Maximum Entropy Approach Using Global Information
This paper presents a maximum entropy-based named entity recognizer (NER). It differs from previous machine learning-based NERs in that it uses information from the whole document...
Hai Leong Chieu, Hwee Tou Ng