Sciweavers

885 search results - page 113 / 177
» Extensions of the Informative Vector Machine
Sort
View
SECURWARE
2008
IEEE
15 years 4 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
IJCNLP
2005
Springer
15 years 3 months ago
Two-Phase Biomedical Named Entity Recognition Using A Hybrid Method
Biomedical named entity recognition (NER) is a difficult problem in biomedical information processing due to the widespread ambiguity of terms out of context and extensive lexical ...
Seonho Kim, Juntae Yoon, Kyung-Mi Park, Hae-Chang ...
SEMWEB
2010
Springer
14 years 4 months ago
Accessing the Web of Data through embodied virtual characters
The amount of data published on the Semantic Web has witnessed a tremendous growth in the last years to which the Linked Open Data (LOD) project has contributed significantly. Whil...
Philipp Cimiano, Stefan Kopp
MLG
2007
Springer
15 years 3 months ago
Weighted Substructure Mining for Image Analysis
1 In web-related applications of image categorization, it is desirable to derive an interpretable classification rule with high accuracy. Using the bag-of-words representation and...
Sebastian Nowozin, Koji Tsuda, Takeaki Uno, Taku K...
COOPIS
2004
IEEE
15 years 1 months ago
Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge
A new class of embedded devices is emerging that has a mixture of traditional firmware (written in C/C++) with an embedded virtual machine (e.g., Java). For these devices, the main...
Jun Li, Keith Moore