Sciweavers

4340 search results - page 853 / 868
» Formal Methods and Cryptography
Sort
View
SDM
2004
SIAM
253views Data Mining» more  SDM 2004»
15 years 1 months ago
Density-Connected Subspace Clustering for High-Dimensional Data
Several application domains such as molecular biology and geography produce a tremendous amount of data which can no longer be managed without the help of efficient and effective ...
Peer Kröger, Hans-Peter Kriegel, Karin Kailin...
IJCAI
2003
15 years 1 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer
WSC
2004
15 years 1 months ago
Speech Acts of War
This research investigates Speech Acts performed in the war film Platoon. It aims at finding details about the types of speech acts, their form and how they are expressed by the i...
John David Salt
RANLP
2003
15 years 1 months ago
Structured parameter estimation for LFG-DOP
Despite its state-of-the-art performance, the Data Oriented Parsing (DOP) model has been shown to suffer from biased parameter estimation, and the good performance seems more the ...
Mary Hearne, Khalil Sima'an
IVCNZ
1998
15 years 1 months ago
Duality Principles in Image Processing and Analysis
Duality is a well-established concept in quantum physics. It formalises the fact that what one observes is not nature in itself, but--in Heisenberg's words--"nature expo...
Luc Florack