Sciweavers

1798 search results - page 264 / 360
» Generating presentation constraints from rhetorical structur...
Sort
View
187
Voted
SIGMOD
2009
ACM
134views Database» more  SIGMOD 2009»
16 years 28 days ago
Keyword query cleaning using hidden Markov models
In this paper, we consider the problem of keyword query cleaning for structured databases from a probabilistic approach. Keyword query cleaning consists of rewriting the user quer...
Ken Q. Pu
110
Voted
COMAD
2009
15 years 1 months ago
Modeling Relational Data as Graphs for Mining
The focus of this paper is to develop algorithms and a framework for modeling transactional data stored in relational database into graphs for mining. Most of the real-world trans...
Subhesh Pradhan, Sharma Chakravarthy, Aditya Telan...
114
Voted
IJMMS
2007
79views more  IJMMS 2007»
15 years 19 days ago
Incorporating tutoring principles into interactive knowledge acquisition
This paper argues that interactive knowledge acquisition systems would benefit from a tighter and more thorough incorporation of tutoring and learning principles. Current acquisit...
Jihie Kim, Yolanda Gil
TIT
2002
98views more  TIT 2002»
15 years 10 days ago
DC-free binary convolutional coding
A novel DC-free binary convolutional coding scheme is presented. The proposed scheme achieves the DC-free and error correcting capability simultaneously. The scheme has a simple ca...
Tadashi Wadayama, A. J. Han Vinck
ICS
2010
Tsinghua U.
15 years 10 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz