Sciweavers

781 search results - page 95 / 157
» Extracting Useful Information from the Full Text of Fiction
Sort
View
TSE
2008
128views more  TSE 2008»
14 years 9 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
JNW
2008
101views more  JNW 2008»
14 years 9 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
15 years 10 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
CIKM
2011
Springer
13 years 9 months ago
Mining entity translations from comparable corpora: a holistic graph mapping approach
This paper addresses the problem of mining named entity translations from comparable corpora, specifically, mining English and Chinese named entity translation. We first observe...
Jinhan Kim, Long Jiang, Seung-won Hwang, Young-In ...
DEXAW
2008
IEEE
136views Database» more  DEXAW 2008»
14 years 11 months ago
Segmentation of Legislative Documents Using a Domain-Specific Lexicon
The amount of legal information is continuously growing. New legislative documents appear everyday in the Web. Legal documents are produced on a daily basis in briefingformat, cont...
Ismael Hasan, Javier Parapar, Roi Blanco