Sciweavers

116 search results - page 15 / 24
» Evaluation of decision trees: a multi-criteria approach
Sort
View
WWW
2002
ACM
15 years 11 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
ACL
2006
15 years 14 days ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...
BMCBI
2008
87views more  BMCBI 2008»
14 years 11 months ago
Identification of deleterious non-synonymous single nucleotide polymorphisms using sequence-derived information
Background: As the number of non-synonymous single nucleotide polymorphisms (nsSNPs), also known as single amino acid polymorphisms (SAPs), increases rapidly, computational method...
Jing Hu, Changhui Yan
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 4 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
MLMI
2004
Springer
15 years 4 months ago
Shallow Dialogue Processing Using Machine Learning Algorithms (or Not)
This paper presents a shallow dialogue analysis model, aimed at human-human dialogues in the context of staff or business meetings. Four components of the model are defined, and ...
Andrei Popescu-Belis, Alexander Clark, Maria Georg...