Sciweavers

2539 search results - page 322 / 508
» Debugging Method Names
Sort
View
EMNLP
2010
15 years 14 days ago
Joint Training and Decoding Using Virtual Nodes for Cascaded Segmentation and Tagging Tasks
Many sequence labeling tasks in NLP require solving a cascade of segmentation and tagging subtasks, such as Chinese POS tagging, named entity recognition, and so on. Traditional p...
Xian Qian, Qi Zhang, Yaqian Zhou, Xuanjing Huang, ...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
15 years 13 days ago
Location and Scatter Matching for Dataset Shift in Text Mining
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed ...
Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong
ICPR
2010
IEEE
15 years 13 days ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
INFOCOM
2010
IEEE
15 years 12 days ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
IPPS
2010
IEEE
15 years 12 days ago
Exploring parallelism in short sequence mapping using Burrows-Wheeler Transform
Next-generation high throughput sequencing instruments are capable of generating hundreds of millions of reads in a single run. Mapping those reads to a reference genome is an ext...
Doruk Bozdag, Ayat Hatem, Ümit V. Çata...